@inproceedings(conf:vstte:AdjeB2014, author = {A. Adje and O. Bouissou and Goubault-Larrecq, J. and E. Goubault and S. Putot}, year = {2014}, title = {Static analysis of programs with imprecise probabilistic inputs.}, booktitle = {In Verified Software: Theories, Tools, Experiments}, pages = {22--47}, doi = {10.1007/978-3-642-54108-7\_2}, ) @article(journals/entcs/AlbertAGP09, author = {Elvira Albert and Puri Arenas and Samir Genaim and Germ{\'a}n Puebla}, year = {2009}, title = {Cost Relation Systems: A Language-Independent Target Language for Cost Analysis.}, journal = {Electr. Notes Theor. Comput. Sci.}, volume = {248}, pages = {31--46}, doi = {10.1016/j.entcs.2009.07.057}, ) @inproceedings(conf/uai/Bauer96, author = {Mathias Bauer}, year = {1996}, title = {Approximations for Decision Making in the Dempster-Shafer Theory of Evidence.}, booktitle = {UAI}, publisher = {Morgan Kaufmann}, pages = {73--80}, url = {http://arxiv.org/abs/1302.3557}, ) @article(journals/rc/BerleantC98, author = {Daniel Berleant and Hang Cheng}, year = {1998}, title = {A Software Tool for Automatically Verified Operations on Intervals and Probability Distributions.}, journal = {Reliable Computing}, volume = {4}, number = {1}, pages = {71--82}, doi = {10.1023/A:1009954817673}, ) @article(journals/jec/BernatBN05, author = {Guillem Bernat and Alan Burns and Martin Newby}, year = {2005}, title = {Probabilistic timing analysis: An approach using copulas.}, journal = {J. Embedded Computing}, volume = {1}, number = {2}, pages = {179--194}, ) @article(journals/computing/BouissouGGP12, author = {Olivier Bouissou and Eric Goubault and Goubault-Larrecq, Jean and Sylvie Putot}, year = {2012}, title = {A generalization of p-boxes to affine arithmetic.}, journal = {Computing}, volume = {94}, number = {2-4}, pages = {189--201}, doi = {10.1007/s00607-011-0182-8}, ) @inproceedings(conf/esop/CousotM12, author = {Patrick Cousot and Michael Monerau}, year = {2012}, title = {Probabilistic Abstract Interpretation.}, booktitle = {ESOP}, series = {LNCS}, volume = {7211}, pages = {169--193}, doi = {10.1007/978-3-642-28869-2\_9}, ) @article(journals/cacm/Denning76, author = {Dorothy E. Denning}, year = {1976}, title = {A Lattice Model of Secure Information Flow.}, journal = {Commun. ACM}, volume = {19}, number = {5}, pages = {236--243}, doi = {10.1145/360051.360056}, ) @inproceedings(conf:isip:Destercke2009, author = {S. Destercke and D. Dubois}, year = {2009}, title = {The role of generalised p-boxes in imprecise probability models}, booktitle = {6th International Symposium on Imprecise Probability: Theories and Applications}, pages = {179--188}, ) @article(journals:ima:DhaeneDGKV02, author = {Jan Dhaene and Michel Denuit and Marc J Goovaerts and R Kaas and David Vyncke}, year = {2002}, title = {The Concept of Comonotonicity in Actuarial Science and Finance: Theory}, journal = {Insurance, mathematics \&{} economics}, volume = {31}, number = {2}, pages = {133--161}, doi = {10.1016/S0167-6687(02)00135-X}, ) @techreport(tech:compegne:Ferson2014, author = {Scott Ferson}, year = {2014}, title = {Model uncertainty in risk analysis}, type = {Tech. report}, institution = {Centre de Recherches de Royallieu, Universite de Technologie de Compiegne}, ) @techreport(tech:sand:Ferson2002, author = {Scott Ferson and Vladik Kreinovich and Lev Ginzburg and Davis S. Myers and and Kari Sentz}, year = {2002}, title = {Constructing Probability Boxes and Dempster-Shafer Structures}, type = {SAND2002-4015}, institution = {Sandia National Laboratories}, ) @article(journals/tcs/FlajoletSZ91, author = {Philippe Flajolet and Bruno Salvy and Paul Zimmermann}, year = {1991}, title = {Automatic Average-Case Analysis of Algorithm.}, journal = {Theor. Comput. Sci.}, volume = {79}, number = {1}, pages = {37--109}, doi = {10.1016/0304-3975(91)90145-R}, ) @inproceedings(conf/sfm/ForejtKNP11, author = {Vojtech Forejt and Marta Z. Kwiatkowska and Gethin Norman and David Parker}, year = {2011}, title = {Automated Verification Techniques for Probabilistic Systems.}, booktitle = {SFM}, series = {LNCS}, volume = {6659}, pages = {53--113}, doi = {10.1007/978-3-642-21455-4\_3}, ) @phdthesis(thesis:cork:gao2013, author = {Ang Gao}, year = {2013}, title = {Modular average case analysis: Language implementation and extension}, type = {Ph.d. thesis}, school = {University College Cork}, ) @inproceedings(conf:issta:Geldenhuys2012, author = {Jaco Geldenhuys and Matthew B Dwyer and Willem Visser}, year = {2012}, title = {Probabilistic symbolic execution}, booktitle = {Proceedings of the 2012 International Symposium on Software Testing and Analysis}, pages = {166--176}, doi = {10.1145/2338965.2336773}, ) @inproceedings(conf:rbes:Gordon1984, author = {Jean Gordon and Edward H. Shortliffe}, year = {1984}, title = {The Dempster-Shafer Theory of Evidence}, booktitle = {Rule-Based Expert Systems: The MYCIN Experiments of the Stanford Heuristic Programming Project}, pages = {21 pp}, ) @article(jour:cc:Guo2007, author = {Xi Guo and Menouer Boubekeur and J. McEnery and David Hickey}, year = {2007}, title = {ACET based scheduling of soft real-time systems: An approach to optimise resource budgeting}, journal = {International Journal of Computers and Communications}, volume = {1}, number = {1}, pages = {82--86}, ) @article(conf:rta:Kay2007, author = {Rakowsky Uwe Kay}, year = {2007}, title = {Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling}, journal = {International Journal of Reliability, Quality and Safety Engineering}, volume = {14}, number = {06}, pages = {579--601}, doi = {10.1142/S0218539307002817}, ) @inproceedings(conf/ershov/KnoopKZ11, author = {Jens Knoop and Laura Kov{\'a}cs and Jakob Zwirchmayr}, year = {2011}, title = {Symbolic Loop Bound Computation for WCET Analysis.}, booktitle = {Ershov Memorial Conference}, series = {LNCS}, volume = {7162}, pages = {227--242}, doi = {10.1007/978-3-642-29709-0\_20}, ) @article(journals/jcss/Kozen81, author = {Dexter Kozen}, year = {1981}, title = {Semantics of Probabilistic Programs.}, journal = {J. Comput. Syst. Sci.}, volume = {22}, number = {3}, pages = {328--350}, doi = {10.1016/0022-0000(81)90036-2}, ) @inproceedings(conf:alleton:Kwiatkowska2010, author = {M. Kwiatkowska and G. Norman and D. Parker}, year = {September 2010}, title = {Advances and challenges of probabilistic model checking.}, booktitle = {48th Annual Allerton Conference on Communication, Control, and Computing}, pages = {1691--1698}, doi = {10.1109/ALLERTON.2010.5707120}, ) @inproceedings(conf:lopstr:Liqat2013, author = {U. Liqat and S. Kerrison and A. Serrano and K. Georgiou and Lopez-Garcia, P. and N. Grech and M. V. Hermenegildo and K. Eder}, year = {2013}, title = {Energy Consumption Analysis of Programs based on XMOS ISA Level Models}, booktitle = {23rd InternatioFnal Symposium on Logic-Based Program Synthesis and Transformation, LOPSTR}, series = {LNCS}, volume = {8901}, pages = {72--90}, doi = {10.1007/978-3-319-14125-1\_5}, ) @inproceedings(conf/iclp/Lopez-GarciaDB10, author = {L{\'o}pez-Garc{\'i}a, Pedro and Luthfi Darmawan and Francisco Bueno}, year = {2010}, title = {A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification.}, booktitle = {ICLP (Technical Communications)}, series = {LIPIcs}, volume = {7}, pages = {104--113}, ) @inproceedings(conf/sas/Monniaux00, author = {David Monniaux}, year = {2000}, title = {Abstract Interpretation of Probabilistic Semantics.}, booktitle = {SAS}, series = {LNCS}, volume = {1824}, pages = {322--339}, doi = {10.1007/978-3-540-45099-3\_17}, ) @article(journals/toplas/MorganMS96, author = {Carroll Morgan and Annabelle McIver and Karen Seidel}, year = {1996}, title = {Probabilistic Predicate Transformers.}, journal = {ACM Trans. Program. Lang. Syst.}, volume = {18}, number = {3}, pages = {325--353}, doi = {10.1145/229542.229547}, ) @inproceedings(conf/birthday/PierroHW06, author = {Alessandra Di Pierro and Chris Hankin and Herbert Wiklicky}, year = {2006}, title = {Abstract Interpretation for Worst and Average Case Analysis.}, booktitle = {Program Analysis and Compilation}, series = {LNCS}, volume = {4444}, pages = {160--174}, doi = {10.1007/978-3-540-71322-7\_8}, ) @inproceedings(conf:pfis:Pierro2013, author = {Alessandra Di Pierro and Herbert Wiklicky and Gabriele Puppis and Tiziano Villa}, year = {2013}, title = {Probabilistic data flow analysis: a linear equational approach}, booktitle = {Proc. Fourth Int. Symp. on Games, Automata, Logics and Formal Verification, GandALF}, volume = {119}, pages = {150--165}, doi = {10.4204/EPTCS.119.14}, ) @article(journals:ing:PollmanCG09, author = {Hector Soza Pollman and Manuel Carro and Pedro Lopez Garcia}, year = {2009}, title = {Probabilistic Cost Analysis of Logic Programs: A First Case Study}, journal = {INGENIARE - Revista Chilena de Ingeniera}, volume = {17}, number = {2}, pages = {195--204}, ) @inproceedings(conf/fpca/Rosendahl89, author = {Mads Rosendahl}, year = {1989}, title = {Automatic Complexity Analysis.}, booktitle = {FPCA}, pages = {144--156}, doi = {10.1145/99370.99381}, ) @inproceedings(conf/birthday/Rosendahl02, author = {Mads Rosendahl}, year = {2002}, title = {Simple Driving Techniques.}, booktitle = {The Essence of Computation}, series = {LNCS}, volume = {2566}, pages = {404--419}, doi = {10.1007/3-540-36377-7\_18}, ) @inproceedings(conf:pldi:SankaranarayananC2013, author = {S. Sankaranarayanan and A. Chakarov and S. Gulwani}, year = {June 2013}, title = {Static analysis for probabilistic programs: inferring whole program properties from finitely many paths}, booktitle = {PLDI}, publisher = {ACM.}, pages = {447--458}, doi = {10.1145/2462156.2462179}, ) @book(books/daglib/0020847, author = {Michel P. Schellekens}, year = {2008}, title = {A modular calculus for the average cost of data structuring.}, publisher = {Springer}, doi = {10.1007/978-0-387-73384-5}, ) @inproceedings(conf/rtas/SchorBYT12, author = {Lars Schor and Iuliana Bacivarov and Hoeseok Yang and Lothar Thiele}, year = {2012}, title = {Worst-Case Temperature Guarantees for Real-Time Applications on Multi-core Systems.}, booktitle = {IEEE Real-Time and Embedded Technology and Applications Symposium}, pages = {87--96}, doi = {10.1007/s10836-013-5397-5}, ) @mastersthesis(thesis:Stellenbosch:Uwimbabazi2013, author = {A. Uwimbabazi}, year = {2013}, title = {Extended probabilistic symbolic execution}, school = {University of Stellenbosch}, ) @article(journals/jcs/VolpanoIS96, author = {Dennis M. Volpano and Cynthia E. Irvine and Geoffrey Smith}, year = {1996}, title = {A Sound Type System for Secure Flow Analysis.}, journal = {Journal of Computer Security}, volume = {4}, number = {2/3}, pages = {167--188}, doi = {10.3233/JCS-1996-42-304}, ) @article(journals/cacm/Wegbreit75, author = {Ben Wegbreit}, year = {1975}, title = {Mechanical Program Analysis.}, journal = {Commun. ACM}, volume = {18}, number = {9}, pages = {528--539}, doi = {10.1145/361002.361016}, ) @incollection(conf:allerton:Wierman2008, author = {Adam Wierman and Lachlan L. H. Andrew and Ao Tang}, year = {2008}, title = {Stochastic Analysis of Power-Aware Scheduling}, booktitle = {Proceedings of Allerton Conference on Communication, Control and Computing}, publisher = {Urbana-Champaign, IL}, pages = {1278--1283}, doi = {10.1109/ALLERTON.2008.4797707}, ) @inproceedings(conf:hdrums:Wilson2000, author = {Nic Wilson}, year = {2000}, title = {Algorithms for Dempster-Shafer Theory}, booktitle = {Handbook of defeasible reasoning and uncertainty management systems}, publisher = {Springer Netherlands}, pages = {421--475}, doi = {10.1007/978-94-017-1737-3\_10}, )