{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T11:15:06Z","timestamp":1771586106237,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030004187","type":"print"},{"value":"9783030004194","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00419-4_12","type":"book-chapter","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T01:35:09Z","timestamp":1536111309000},"page":"174-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Risk-Limiting Audits by Stratified Union-Intersection Tests of Elections (SUITE)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9107-3402","authenticated-orcid":false,"given":"Kellie","family":"Ottoboni","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3771-9604","authenticated-orcid":false,"given":"Philip B.","family":"Stark","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8815-815X","authenticated-orcid":false,"given":"Mark","family":"Lindeman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8667-1830","authenticated-orcid":false,"given":"Neal","family":"McBurnett","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,9,6]]},"reference":[{"key":"12_CR1","unstructured":"Ba\u00f1uelos, J., Stark, P.: Limiting risk by turning manifest phantoms into evil zombies. Technical report, \narXiv.org\n\n (2012). \nhttp:\/\/arxiv.org\/abs\/1207.3413\n\n. Accessed 17 July 2012"},{"key":"12_CR2","unstructured":"California Secretary of State: California Secretary of State Post-Election Risk-Limiting Audit Pilot Program 2011\u20132013: Final Report to the United States Election Assistance Commission (2014). \nhttp:\/\/votingsystems.cdn.sos.ca.gov\/oversight\/risk-pilot\/final-report-073014.pdf\n\n Accessed 6 May 2018"},{"key":"12_CR3","unstructured":"Grimmett, G.R., Stirzaker, D.R.: Probability and Random Processes. Oxford University Press, Oxford, August 2001. \nwww.amazon.ca\/exec\/obidos\/redirect?tag=citeulike09-20&path=ASIN\/0198572220"},{"key":"12_CR4","unstructured":"Higgins, M., Rivest, R., Stark, P.: Sharper p-values for stratified post-election audits. Stat. Polit. Policy 2(1) (2011). \nhttp:\/\/www.bepress.com\/spp\/vol2\/iss1\/7"},{"key":"12_CR5","unstructured":"Lindeman, M., Stark, P., Yates, V.: BRAVO: ballot-polling risk-limiting audits to verify outcomes. In: Proceedings of the 2011 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 2011). USENIX (2012)"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2012.56","volume":"10","author":"M Lindeman","year":"2012","unstructured":"Lindeman, M., Stark, P.B.: A gentle introduction to risk-limiting audits. IEEE Secur. Priv. 10, 42\u201349 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470689516","volume-title":"Permutation Tests for Complex Data: Theory, Applications, and Software","author":"F Pesarin","year":"2010","unstructured":"Pesarin, F., Salmaso, L.: Permutation Tests for Complex Data: Theory, Applications, and Software. Wiley, West Sussex (2010)"},{"key":"12_CR8","unstructured":"Rivest, R.L.: Bayesian tabulation audits: explained and extended, 1 January 2018. \nhttps:\/\/arxiv.org\/abs\/1801.00528"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Stark, P.: Conservative statistical post-election audits. Ann. Appl. Stat. 2, 550\u2013581 (2008). \nhttp:\/\/arxiv.org\/abs\/0807.4005","DOI":"10.1214\/08-AOAS161"},{"key":"12_CR10","unstructured":"Stark, P.: Auditing a collection of races simultaneously. Technical report. \narXiv.org\n\n (2009). \nhttp:\/\/arxiv.org\/abs\/0905.1422v1"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/TIFS.2009.2034210","volume":"4","author":"P Stark","year":"2009","unstructured":"Stark, P.: CAST: canvass audits by sampling and testing. IEEE Trans. Inf. Forensics Secur. Spec. Issue Electron. Voting 4, 708\u2013717 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur. Spec. Issue Electron. Voting"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2009.2034190","volume":"4","author":"P Stark","year":"2009","unstructured":"Stark, P.: Risk-limiting post-election audits: $$P$$P-values from common probability inequalities. IEEE Trans. Inf. Forensics Secur. 4, 1005\u20131014 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/09332480.2010.10739816","volume":"23","author":"P Stark","year":"2010","unstructured":"Stark, P.: Risk-limiting vote-tabulation audits: the importance of cluster size. Chance 23(3), 9\u201312 (2010)","journal-title":"Chance"},{"key":"12_CR14","unstructured":"Stark, P.: Super-simple simultaneous single-ballot risk-limiting audits. In: Proceedings of the 2010 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 2010). USENIX (2010). \nhttp:\/\/www.usenix.org\/events\/evtwote10\/tech\/full_papers\/Stark.pdf"},{"key":"12_CR15","unstructured":"Stark, P.B., Teague, V.: Verifiable European elections: risk-limiting audits for D\u2019Hondt and its relatives. JETS: USENIX J. Election Technol. Syst. 3(1) (2014). \nhttps:\/\/www.usenix.org\/jets\/issues\/0301\/stark"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSP.2012.62","volume":"10","author":"PB Stark","year":"2012","unstructured":"Stark, P.B., Wagner, D.A.: Evidence-based elections. IEEE Secur. Priv. 10, 33\u201341 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1214\/aoms\/1177731118","volume":"16","author":"A Wald","year":"1945","unstructured":"Wald, A.: Sequential tests of statistical hypotheses. Ann. Math. Stat. 16, 117\u2013186 (1945)","journal-title":"Ann. Math. Stat."}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00419-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T01:41:44Z","timestamp":1536111704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00419-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004187","9783030004194"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00419-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}