External Publications
Abramsky et al. 2000
S. Abramsky, R. Jagadeesan, and P. Malacaria. Full abstraction for PCF. Inf.
Comput., 163:409–470, 2000.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Bhargava, Palamidessi 2005
M. Bhargava and C. Palamidessi. Probabilistic anonymity. In Proceedings of
CONCUR, volume 3653 of LNCS, 2005.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Chaum 1988
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient
untraceability. J. Cryptology, 1(1):65–75, 1988.
[ Google ] [ Google Scholar ]
Ciesinki, Baier 2006
F. Ciesinski and C. Baier. L A tool for qualitative and quantitative linear time analysis of reactive systems. In Proceedings of QEST. IEEE Computer
Society, 2006.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Cormen et al. 2001
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. MIT Press, second edition, 2001.
[ Google ] [ Google Scholar ]
Danos, Harmer 2002
V. Danos and R. Harmer. Probabilistic game semantics. ACM Trans. Comput.
Log., 3(3):359–382, 2002.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Dijkstra 1974
E. W. Dijkstra. Self-stabilizing systems in spite of distributed control. Commun.
ACM, 17(11):643–644, 1974.
[ Google ] [ Google Scholar ]
Esparza, Etessami 2004
J. Esparza and K. Etessami. Verifying probabilistic procedural programs. In
Proceedings of FSTTCS, volume 3328 of LNCS, 2004.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Herman 1990
T. Herman. Probabilistic self-stabilization. Inf. Process. Lett., 35(2):63–67, 1990.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Hibbard 1962
T. N. Hibbard. Some combinatorial properties of certain trees with applications to searching and sorting. J. ACM, 9(1):13–28, 1962.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Hinton et al. 2006
A. Hinton, M. Z. Kwiatkowska, G. Norman, and D. Parker. PRISM: A tool for automatic verification of probabilistic systems. In Proceedings of TACAS, volume
3920 of LNCS, 2006.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Hyland, L 2000
J. M. E. Hyland and C.-H. L. Ong. On Full Abstraction for PCF: I. Models, observables and the full abstraction problem, II. Dialogue games and innocent strategies, III. A fully abstract and universal game model. Inf. Comput., 163(2):285–408,
2000.
[ Google ] [ Google Scholar ]
Jonassen, Knuth 1978
A. T. Jonassen and D. E. Knuth. A trivial algorithm whose analysis isn’t. J.
Comput. Syst. Sci., 16(3):301–322, 1978.
[ Google ] [ Google Scholar ]
Knott 1975
G. D. Knott. Deletion in Binary Storage Trees. PhD thesis, Stanford University,
1975. Computer Science Technical Report STAN-CS-75-491.
[ Google ] [ Google Scholar ]
Knuth 1973
D. E. Knuth. Sorting and searching. In Volume 3 of The Art of Computer
Programming (first printing). Addison-Wesley, 1973.
[ Google ] [ Google Scholar ]
Kozen 1981
D. Kozen. Semantics of probabilistic programs. J. Comput. Syst. Sci., 22(3):328–
350, 1981.
[ Google ] [ Google Scholar ]
Larsen, Skou 1992
K. Larsen and A. Skou. Compositional verification of probabilistic processes. In
Proceedings of CONCUR, volume 630 of LNCS, 1992.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Legay et al.
A. Legay, A. S.Murawski, J. Ouaknine, and J.Worrell. Verification of probabilistic programs via equivalence checking. In preparation.
[ Google ] [ Google Scholar ]
Norman et al. 2007
G. Norman, C. Palamidessi, D. Parker, and P. Wu. Model checking the probabilistic calculus. In Proceedings of QEST. IEEE Computer Society, 2007.
[ Google ] [ Google Scholar ] [ Publisher's website ]
PRISM
PRISM case study: Dining Cryptographers.
www.prismmodelchecker.org/casestudies/dining crypt.php.
[ Google ] [ Google Scholar ]
Rabin 1963
M. O. Rabin. Probabilistic automata. Information and Control, 6(3):230–245,
1963.
[ Google ] [ Google Scholar ]
Rabin 1976
M. O. Rabin. Probabilistic algorithms. In Proceedings of the Symposium on
Algorithms and Complexity. Academic Press, 1976.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Schneider, Sidiropoulos 1996
S. Schneider and A. Sidiropoulos. CSP and anonymity. In Proceedings of ES-
ORICS, volume 1146 of LNCS, 1996.
[ Google ] [ Google Scholar ] [ Publisher's website ]
Tzeng 1992
W.-G. Tzeng. A polynomial-time algorithm for the equivalence of probabilistic automata. SIAM J. Comput., 21(2):216–227, 1992.
[ Google ] [ Google Scholar ]
Back to Top