References

  1. E.A. Boiten (2004): Input/Output Abstraction of State Based Systems. Technical Report. School of Computing, University of Kent. Available at https://kar.kent.ac.uk/14143/.
  2. E.A. Boiten & J. Derrick (2005): Formal Program Development with Approximations. In: H. Treharne, S. King, M. Henson & S. Schneider: ZB 2005, Lecture Notes in Computer Science 3455. Springer, pp. 375–393, doi:10.1007/11415787\voidb@x width0.4em22.
  3. Eerke A. Boiten (2014): Google's Larry Page wants to save 100,000 lives but big data isn't a cure all. The Conversation. Available at https://theconversation.com/googles-larry-page-wants-to-save-100-000-lives-but-big-data-isnt-a-cure-all-28529.
  4. Claude Crépeau (1997): Efficient Cryptographic Protocols Based on Noisy Channels. IACR Cryptology ePrint Archive 1997, pp. 3. Available at http://eprint.iacr.org/1997/003.
  5. J. Derrick & E.A. Boiten (2014): Refinement in Z and Object-Z: Foundations and Advanced Applications, 2nd edition. Springer, doi:10.1007/978-1-4471-5355-9.
  6. Shigeru Kusakabe (2011): Large Volume Testing for Executable Formal Specification Using Hadoop. In: 25th IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2011, Anchorage, Alaska, USA, 16-20 May 2011 - Workshop Proceedings. IEEE, pp. 1250–1257, doi:10.1109/IPDPS.2011.278. Available at http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6008655.
  7. D. Laney (2001): 3D Data Management: Controlling Data Volume, Velocity, and Variety. Application Delivery Strategies. Meta Group. Available at http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf.
  8. A. McIver & C. Morgan (2004): Abstraction, Refinement and Proof for Probabilistic Systems. Springer.
  9. Kosuke Ono, Yoichi Hirai, Yoshinori Tanabe, Natsuko Noda & Masami Hagiya (2011): Using Coq in Specification and Program Extraction of Hadoop MapReduce Applications. In: Gilles Barthe, Alberto Pardo & Gerardo Schneider: Software Engineering and Formal Methods, Lecture Notes in Computer Science 7041. Springer Berlin Heidelberg, pp. 350–365, doi:10.1007/978-3-642-24690-6\voidb@x width0.4em24.
  10. Frank Pasquale (2015): The Black Box Society. Harvard Press, doi:10.4159/harvard.9780674736061.
  11. G. Satya Reddy, Yuzhang Feng, Yang Liu, Jin Song Dong, Jun Sun & Rajaraman Kanagasabai (2013): Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop. In: IEEE Ninth World Congress on Services, SERVICES 2013, Santa Clara, CA, USA, June 28 - July 3, 2013. IEEE Computer Society, pp. 306–311, doi:10.1109/SERVICES.2013.47. Available at http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6596100.
  12. Wen Su, Fan Yang, Huibiao Zhu & Qin Li (2009): Modeling MapReduce with CSP. In: Wei-Ngan Chin & Shengchao Qin: TASE 2009, Third IEEE International Symposium on Theoretical Aspects of Software Engineering, 29-31 July 2009, Tianjin, China. IEEE Computer Society, pp. 301–302, doi:10.1109/TASE.2009.28. Available at http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5198469.
  13. M. Ying (2003): Reasoning about probabilistic sequential programs in a probabilistic logic. Acta Informatica 39(5), pp. 315–389, doi:10.1007/s00236-003-0113-z.
  14. Frederik J. Zuiderveen Borgesius (2015): Improving privacy protection in the area of behavioural targeting. Wolters Kluwer.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org