{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:50:59Z","timestamp":1760028659200,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633862"},{"type":"electronic","value":"9783319633879"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63387-9_9","type":"book-chapter","created":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T08:53:43Z","timestamp":1499849623000},"page":"181-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Repairing Decision-Making Programs Under Uncertainty"],"prefix":"10.1007","author":[{"given":"Aws","family":"Albarghouthi","sequence":"first","affiliation":[]},{"given":"Loris","family":"D\u2019Antoni","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Drews","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,13]]},"reference":[{"key":"9_CR1","unstructured":"UCI machine learning repository: Census income. https:\/\/archive.ics.uci.edu\/ml\/datasets\/Adult\/"},{"key":"9_CR2","unstructured":"Weka. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"9_CR3","unstructured":"Code of federal regulations, July 2014. https:\/\/www.gpo.gov\/fdsys\/pkg\/CFR-2014-title29-vol4\/xml\/CFR-2014-title29-vol4-part1607.xml. Accessed 18 June 2016"},{"key":"9_CR4","unstructured":"Albarghouthi, A., D\u2019Antoni, L., Drews, S., Nori, A.: Fairness as a program property. In: FATML, November 2016. http:\/\/pages.cs.wisc.edu\/sdrews\/papers\/fatml16.pdf"},{"key":"9_CR5","unstructured":"Angwin, J., Larson, J., Mattu, S., Kirchner, L.: Machine bias: there\u2019s software used across the country to predict future criminals. And it\u2019s biased against blacks, May 2016. https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing. Accessed 18 June 2016"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-19835-9_30","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E Bartocci","year":"2011","unstructured":"Bartocci, E., Grosu, R., Katsaros, P., Ramakrishnan, C.R., Smolka, S.A.: Model repair for probabilistic systems. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 326\u2013340. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-19835-9_30"},{"issue":"4","key":"9_CR7","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1145\/76359.76371","volume":"36","author":"A Blumer","year":"1989","unstructured":"Blumer, A., Ehrenfeucht, A., Haussler, D., Warmuth, M.K.: Learnability and the vapnik-chervonenkis dimension. J. ACM (JACM) 36(4), 929\u2013965 (1989)","journal-title":"J. ACM (JACM)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Chaudhuri, S., Clochard, M., Solar-Lezama, A.: Bridging boolean and quantitative synthesis using smoothed proof search. In: POPL, vol. 49, pp. 207\u2013220. ACM (2014)","DOI":"10.1145\/2578855.2535859"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Chen, T., Hahn, E.M., Han, T., Kwiatkowska, M., Qu, H., Zhang, L.: Model repair for markov decision processes. In: 2013 International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 85\u201392. IEEE (2013)","DOI":"10.1109\/TASE.2013.20"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-319-41540-6_21","volume-title":"Computer Aided Verification","author":"L D\u2019Antoni","year":"2016","unstructured":"D\u2019Antoni, L., Samanta, R., Singh, R.: Qlose: program repair with quantitative objectives. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9780, pp. 383\u2013401. Springer, Cham (2016). doi:10.1007\/978-3-319-41540-6_21"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Datta, A., Sen, S., Zick, Y.: Algorithmic transparency via quantitative input influence. In: Proceedings of 37th IEEE Symposium on Security and Privacy (2016)","DOI":"10.1109\/SP.2016.42"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Dwork, C., Hardt, M., Pitassi, T., Reingold, O., Zemel, R.S.: Fairness through awareness. In: Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, 8\u201310 January 2012, pp. 214\u2013226 (2012)","DOI":"10.1145\/2090236.2090255"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Feldman, M., Friedler, S.A., Moeller, J., Scheidegger, C., Venkatasubramanian, S.: Certifying and removing disparate impact. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, NSW, Australia, 10\u201313 August 2015, pp. 259\u2013268 (2015). http:\/\/doi.acm.org\/10.1145\/2783258.2783311","DOI":"10.1145\/2783258.2783311"},{"key":"9_CR14","unstructured":"Friedler, S.A., Scheidegger, C., Venkatasubramanian, S.: On the (im)possibility of fairness. CoRR abs\/1609.07236 (2016). http:\/\/arxiv.org\/abs\/1609.07236"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-319-41528-4_4","volume-title":"Computer Aided Verification","author":"T Gehr","year":"2016","unstructured":"Gehr, T., Misailovic, S., Vechev, M.: PSI: exact symbolic inference for probabilistic programs. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9779, pp. 62\u201383. Springer, Cham (2016). doi:10.1007\/978-3-319-41528-4_4"},{"key":"9_CR16","unstructured":"Hardt, M., Price, E., Srebro, N.: Equality of opportunity in supervised learning. CoRR abs\/1610.02413 (2016). http:\/\/arxiv.org\/abs\/1610.02413"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11513988_23","volume-title":"Computer Aided Verification","author":"B Jobstmann","year":"2005","unstructured":"Jobstmann, B., Griesmayer, A., Bloem, R.: Program repair as a game. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 226\u2013238. Springer, Heidelberg (2005). doi:10.1007\/11513988_23"},{"key":"9_CR18","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3897.001.0001","volume-title":"An Introduction to Computational Learning Theory","author":"MJ Kearns","year":"1994","unstructured":"Kearns, M.J., Vazirani, U.V.: An Introduction to Computational Learning Theory. MIT press, Cambridge (1994)"},{"key":"9_CR19","unstructured":"Kobie, N.: Who do you blame when an algorithm gets you fired?, January 2016. http:\/\/www.wired.co.uk\/article\/make-algorithms-accountable. Accessed 18 June 2016"},{"key":"9_CR20","unstructured":"K\u00f6nighofer, R., Bloem, R.: Automated error localization and correction for imperative programs. In: Formal Methods in Computer-Aided Design (FMCAD 2011), pp. 91\u2013100. IEEE (2011)"},{"issue":"1","key":"9_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1613\/jair.505","volume":"9","author":"ML Littman","year":"1998","unstructured":"Littman, M.L., Goldsmith, J., Mundhenk, M.: The computational complexity of probabilistic planning. J. Artif. Intell. Res. 9(1), 1\u201336 (1998)","journal-title":"J. Artif. Intell. Res."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Mechtaev, S., Yi, J., Roychoudhury, A.: Directfix: looking for simple program repairs. In: Proceedings of the 37th International Conference on Software Engineering, vol. 1, pp. 448\u2013458. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.63"},{"key":"9_CR23","unstructured":"Miller, C.C.: When algorithms discriminate, July 2015. http:\/\/www.nytimes.com\/2015\/07\/10\/upshot\/when-algorithms-discriminate.html?_r=0. Accessed 18 June 2016"},{"issue":"2","key":"9_CR24","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/0022-0000(85)90045-5","volume":"31","author":"CH Papadimitriou","year":"1985","unstructured":"Papadimitriou, C.H.: Games against nature. J. Comput. Syst. Sci. 31(2), 288\u2013301 (1985)","journal-title":"J. Comput. Syst. Sci."},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Sharma, R., Nori, A.V., Aiken, A.: Bias-variance tradeoffs in program analysis. In: Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2014, NY, USA, pp. 127\u2013137 (2014). http:\/\/doi.acm.org\/10.1145\/2535838.2535853","DOI":"10.1145\/2535838.2535853"},{"key":"9_CR26","unstructured":"Solar-Lezama, A.: Program synthesis by sketching. Ph.D. thesis, University of California, Berkeley (2008)"},{"issue":"1","key":"9_CR27","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s10703-015-0223-6","volume":"47","author":"C Von Essen","year":"2015","unstructured":"Von Essen, C., Jobstmann, B.: Program repair without regret. Formal Methods Syst. Des. 47(1), 26\u201350 (2015)","journal-title":"Formal Methods Syst. Des."}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63387-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T12:22:07Z","timestamp":1692879727000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-63387-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633862","9783319633879"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63387-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Aided Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heidelberg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cav2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cavconference.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}