@inproceedings(BatainehMeyden11, author = {Al{-}Bataineh, O. I. and R. van der Meyden}, year = {2011}, title = {Abstraction for epistemic model checking of dining cryptographers-based protocols}, booktitle = {Proc. of the 13th Conf. on Theoretical Aspects of Rationality and Knowledge (TARK-2011)}, pages = {247--256}, doi = {10.1145/2000378.2000408}, ) @inproceedings(AlBatainehMeyden10, author = {O. Al Bataineh and R. van der Meyden}, year = {2010}, title = {Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast}, booktitle = {SecureComm'10, 6th International ICST Conference on Security and Privacy in Communication Networks}, doi = {10.1007/978-3-642-16161-2_25}, ) @inproceedings(BaukusM04, author = {K. Baukus and R. van der Meyden}, year = {2004}, title = {A Knowledge Based Analysis of Cache Coherence}, booktitle = {Proc. 6th Int. Conf. on Formal Engineering Methods, {ICFEM} 2004}, pages = {99--114}, doi = {10.1007/978-3-540-30482-1_15}, ) @book(BB72, author = {U. Bertel\`{e} and F. Brioschi}, year = {1972}, title = {Nonserial Dynamic Programming}, publisher = {Academic Press}, ) @article(BoureanuCL09, author = {I. Boureanu and M. Cohen and A. Lomuscio}, year = {2009}, title = {Automatic verification of temporal-epistemic properties of cryptographic protocols}, journal = {Journal of Applied Non-Classical Logics}, volume = {19}, number = {4}, pages = {463--487}, doi = {10.3166/jancl.19.463-487}, ) @article(BozzanoCGT15, author = {M. Bozzano and A. Cimatti and M. Gario and S. Tonetta}, year = {2015}, title = {Formal Design of Asynchronous Fault Detection and Identification Components using Temporal Epistemic Logic}, journal = {Logical Methods in Computer Science}, volume = {11}, number = {4}, doi = {10.2168/LMCS-11(4:4)2015}, ) @article(chaum, author = {D. Chaum}, year = {1988}, title = {The Dining Cryptographers problem: Unconditional sender and recipient untraceability}, journal = {Journal of Cryptology}, pages = {65--75}, doi = {10.1007/BF00206326}, ) @article(Darwiche97, author = {A. Darwiche}, year = {1997}, title = {A Logical Notion of Conditional Independence: Properties and Application}, journal = {Artif. Intell.}, volume = {97}, number = {1-2}, pages = {45--82}, doi = {10.1016/S0004-3702(97)00042-8}, ) @article(Darwiche98, author = {A. Darwiche}, year = {1998}, title = {Model-Based Diagnosis using Structured System Descriptions}, journal = {J. Artif. Intell. Res. {(JAIR)}}, volume = {8}, pages = {165--222}, doi = {10.1613/jair.462}, ) @article(DitmarschHMR06, author = {H. P. van Ditmarsch and W. van der Hoek and R. van der Meyden and J. Ruan}, year = {2006}, title = {Model Checking Russian Cards}, journal = {Electr. Notes Theor. Comput. Sci.}, volume = {149}, number = {2}, pages = {105--123}, doi = {10.1016/j.entcs.2005.07.029}, ) @article(Fagin77, author = {R. Fagin}, year = {1977}, title = {Multivalued Dependencies and a New Normal Form for Relational Databases}, journal = {{ACM} Trans. Database Syst.}, volume = {2}, number = {3}, pages = {262--278}, doi = {10.1145/320557.320571}, ) @inproceedings(mck, author = {P. Gammie and R. van der Meyden}, year = {2004}, title = {{{MCK:} Model checking the logic of knowledge}}, booktitle = {Proc. 16th Int. Conf. on computer aided verification (CAV'04)}, pages = {479--483}, doi = {10.1007/978-3-540-72734-7_14}, ) @inproceedings(HuangMM11, author = {X. Huang and P. Maupin and R. van der Meyden}, year = {2011}, title = {Model Checking Knowledge in Pursuit Evasion Games}, booktitle = {{IJCAI} 2011, Proc. of the 22nd Int. Joint Conf. on Artificial Intelligence}, pages = {240--245}, doi = {10.5591/978-1-57735-516-8/IJCAI11-051}, ) @inproceedings(HuangRT13, author = {X. Huang and J. Ruan and M. Thielscher}, year = {2013}, title = {Model Checking for Reasoning about Incomplete Information Games}, booktitle = {Proc. {AI} 2013: Advances in Artificial Intelligence - 26th Australasian Joint Conf.}, pages = {246--258}, doi = {10.1007/978-3-319-03680-9_27}, ) @inproceedings(HurNRS14, author = {C. Hur and A. V. Nori and S. K. Rajamani and S. Samuel}, year = {2014}, title = {Slicing probabilistic programs}, booktitle = {{ACM} {SIGPLAN} Conf. on Programming Language Design and Implementation, {PLDI}'14}, pages = {16}, doi = {10.1145/2594291.2594303}, ) @incollection(KohlasShenoy, author = {J. Kohlas and P.P. Shenoy}, year = {2000}, title = {Computation in Valuation Algebras}, booktitle = {Algorithms for Uncertainty and Defeasible Reasoning: Handbook of Defeasible Reasoning and Uncertainty Management Systems}, volume = {5}, publisher = {Kluwer Academic Publishers}, pages = {5--39}, doi = {10.1007/978-94-017-1737-3_2}, ) @book(KollerFriedman, author = {D. Koller and N. Friedman}, year = {2009}, title = {Probabilistic Graphical Models}, publisher = {MIT Press}, ) @phdthesis(Kong, author = {A. Kong}, year = {1986}, title = {Multivariate Belief Functions and Graphical Models}, school = {Department of Statistics, Harvard University}, ) @article(LDLL90, author = {S. L. Lauritzen and A. Philip Dawid and B. N. Larsen and H. Leimer}, year = {1990}, title = {Independence properties of directed markov fields}, journal = {Networks}, volume = {20}, number = {5}, pages = {491--505}, doi = {10.1002/net.3230200503}, ) @book(Maier83, author = {D. Maier}, year = {1983}, title = {The Theory of Relational Databases}, publisher = {Computer Science Press}, ) @inproceedings(MS, author = {R. van der Meyden and K. Su}, year = {2004}, title = {Symbolic model checking the knowledge of the dining cryptographers}, booktitle = {Proc. 17th IEEE Computer Security Foundation Workshop}, publisher = {IEEE Computer Society}, pages = {280--291}, doi = {10.1109/CSFW.2004.19}, ) @phdthesis(Olmsted, author = {S. Olmsted}, year = {1983}, title = {On representing and Solving Decision Problems}, school = {Dept. of Engineering-Economic Systems, Stanford University}, ) @book(pearlprobbook, author = {J. Pearl}, year = {1988}, title = {Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference}, publisher = {Morgan Kaufmann}, address = {San Mateo, CA}, ) @unpublished(rivest99, author = {R. L. Rivest}, year = {1999}, title = {Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer}, note = {Unpublished, but available at {\url{http://theory.lcs.mit.edu/~rivest/publications.html}}}, ) @article(Shenoy89, author = {P.P. Shenoy}, year = {1989}, title = {A valuation-based language for expert systems}, journal = {Int. J. of Approximate Reasoning}, volume = {3}, pages = {383--411}, doi = {10.1016/0888-613X(89)90009-1}, ) @incollection(Shenoy92, author = {P.P Shenoy}, year = {1992}, title = {Valuation-Based Systems: A Framework for Managing Uncertainty in Expert Systems}, editor = {L.A. Zadeh and J. Kacprzyk}, booktitle = {Fuzzy Logic for the Management of Uncertainty}, publisher = {John Wiley and Sons}, pages = {83--104}, ) @incollection(ShenoyShafer90, author = {P.P. Shenoy and G. Shafer}, year = {1990}, title = {Axioms for Probability and Belief Function Propagation}, editor = {R.D. Shachter and T.S. Levitt and J.F. Lemmer and L.N. Kanal}, booktitle = {Uncertainty in Artifical Intelligence}, volume = {4}, publisher = {North Holland}, pages = {169--198}, doi = {10.1016/B978-0-444-88650-7.50019-6}, ) @incollection(Spohn88, author = {W. Spohn}, year = {1988}, title = {Ordinal conditional functions: a dynamic theory of epistemic states}, editor = {W.L. Harper and B. Skyrms}, booktitle = {Causation in Decision, Belief Change, and Statistics}, publisher = {Springer}, pages = {105--134}, doi = {10.1007/978-94-009-2865-7_6}, ) @inproceedings(VP88, author = {T. Verma and J.Pearl}, year = {1988}, title = {Causal Networks: Semantics and Expressiveness}, booktitle = {Proc. 4th Workshop on Uncertainty in AI}, pages = {352--359}, ) @article(WM01, author = {N. Wilson and J. Mengin}, year = {2001}, title = {Embedding Logics in the Local Computation Framework}, journal = {Journal of Applied Non-Classical Logics}, volume = {11}, number = {3-4}, pages = {239--261}, doi = {10.3166/jancl.11.239-267}, )