References

  1. O. I. Al-Bataineh & R. van der Meyden (2011): Abstraction for epistemic model checking of dining cryptographers-based protocols. In: Proc. of the 13th Conf. on Theoretical Aspects of Rationality and Knowledge (TARK-2011), pp. 247–256, doi:10.1145/2000378.2000408.
  2. O. Al Bataineh & R. van der Meyden (2010): Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast. In: SecureComm'10, 6th International ICST Conference on Security and Privacy in Communication Networks, doi:10.1007/978-3-642-16161-2_25.
  3. K. Baukus & R. van der Meyden (2004): A Knowledge Based Analysis of Cache Coherence. In: Proc. 6th Int. Conf. on Formal Engineering Methods, ICFEM 2004, pp. 99–114, doi:10.1007/978-3-540-30482-1_15.
  4. U. Bertelè & F. Brioschi (1972): Nonserial Dynamic Programming. Academic Press.
  5. I. Boureanu, M. Cohen & A. Lomuscio (2009): Automatic verification of temporal-epistemic properties of cryptographic protocols. Journal of Applied Non-Classical Logics 19(4), pp. 463–487, doi:10.3166/jancl.19.463-487.
  6. M. Bozzano, A. Cimatti, M. Gario & S. Tonetta (2015): Formal Design of Asynchronous Fault Detection and Identification Components using Temporal Epistemic Logic. Logical Methods in Computer Science 11(4), doi:10.2168/LMCS-11(4:4)2015.
  7. D. Chaum (1988): The Dining Cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, pp. 65–75, doi:10.1007/BF00206326.
  8. A. Darwiche (1997): A Logical Notion of Conditional Independence: Properties and Application. Artif. Intell. 97(1-2), pp. 45–82, doi:10.1016/S0004-3702(97)00042-8.
  9. A. Darwiche (1998): Model-Based Diagnosis using Structured System Descriptions. J. Artif. Intell. Res. (JAIR) 8, pp. 165–222, doi:10.1613/jair.462.
  10. H. P. van Ditmarsch, W. van der Hoek, R. van der Meyden & J. Ruan (2006): Model Checking Russian Cards. Electr. Notes Theor. Comput. Sci. 149(2), pp. 105–123, doi:10.1016/j.entcs.2005.07.029.
  11. R. Fagin (1977): Multivalued Dependencies and a New Normal Form for Relational Databases. ACM Trans. Database Syst. 2(3), pp. 262–278, doi:10.1145/320557.320571.
  12. P. Gammie & R. van der Meyden (2004): MCK: Model checking the logic of knowledge. In: Proc. 16th Int. Conf. on computer aided verification (CAV'04), pp. 479–483, doi:10.1007/978-3-540-72734-7_14.
  13. X. Huang, P. Maupin & R. van der Meyden (2011): Model Checking Knowledge in Pursuit Evasion Games. In: IJCAI 2011, Proc. of the 22nd Int. Joint Conf. on Artificial Intelligence, pp. 240–245, doi:10.5591/978-1-57735-516-8/IJCAI11-051.
  14. X. Huang, J. Ruan & M. Thielscher (2013): Model Checking for Reasoning about Incomplete Information Games. In: Proc. AI 2013: Advances in Artificial Intelligence - 26th Australasian Joint Conf., pp. 246–258, doi:10.1007/978-3-319-03680-9_27.
  15. C. Hur, A. V. Nori, S. K. Rajamani & S. Samuel (2014): Slicing probabilistic programs. In: ACM SIGPLAN Conf. on Programming Language Design and Implementation, PLDI'14, pp. 16, doi:10.1145/2594291.2594303.
  16. J. Kohlas & P.P. Shenoy (2000): Computation in Valuation Algebras. In: Algorithms for Uncertainty and Defeasible Reasoning: Handbook of Defeasible Reasoning and Uncertainty Management Systems 5. Kluwer Academic Publishers, pp. 5–39, doi:10.1007/978-94-017-1737-3_2.
  17. D. Koller & N. Friedman (2009): Probabilistic Graphical Models. MIT Press.
  18. A. Kong (1986): Multivariate Belief Functions and Graphical Models. Department of Statistics, Harvard University.
  19. S. L. Lauritzen, A. Philip Dawid, B. N. Larsen & H. Leimer (1990): Independence properties of directed markov fields. Networks 20(5), pp. 491–505, doi:10.1002/net.3230200503.
  20. D. Maier (1983): The Theory of Relational Databases. Computer Science Press.
  21. R. van der Meyden & K. Su (2004): Symbolic model checking the knowledge of the dining cryptographers. In: Proc. 17th IEEE Computer Security Foundation Workshop. IEEE Computer Society, pp. 280–291, doi:10.1109/CSFW.2004.19.
  22. S. Olmsted (1983): On representing and Solving Decision Problems. Dept. of Engineering-Economic Systems, Stanford University.
  23. J. Pearl (1988): Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Mateo, CA.
  24. R. L. Rivest (1999): Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer. Unpublished, but available at http://theory.lcs.mit.edu/~rivest/publications.html.
  25. P.P. Shenoy (1989): A valuation-based language for expert systems. Int. J. of Approximate Reasoning 3, pp. 383–411, doi:10.1016/0888-613X(89)90009-1.
  26. P.P Shenoy (1992): Valuation-Based Systems: A Framework for Managing Uncertainty in Expert Systems. In: L.A. Zadeh & J. Kacprzyk: Fuzzy Logic for the Management of Uncertainty. John Wiley and Sons, pp. 83–104.
  27. P.P. Shenoy & G. Shafer (1990): Axioms for Probability and Belief Function Propagation. In: R.D. Shachter, T.S. Levitt, J.F. Lemmer & L.N. Kanal: Uncertainty in Artifical Intelligence 4. North Holland, pp. 169–198, doi:10.1016/B978-0-444-88650-7.50019-6.
  28. W. Spohn (1988): Ordinal conditional functions: a dynamic theory of epistemic states. In: W.L. Harper & B. Skyrms: Causation in Decision, Belief Change, and Statistics. Springer, pp. 105–134, doi:10.1007/978-94-009-2865-7_6.
  29. T. Verma & J.Pearl (1988): Causal Networks: Semantics and Expressiveness. In: Proc. 4th Workshop on Uncertainty in AI, pp. 352–359.
  30. N. Wilson & J. Mengin (2001): Embedding Logics in the Local Computation Framework. Journal of Applied Non-Classical Logics 11(3-4), pp. 239–261, doi:10.3166/jancl.11.239-267.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org