{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:06:35Z","timestamp":1760043995851,"version":"3.37.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319667058"},{"type":"electronic","value":"9783319667065"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66706-5_22","type":"book-chapter","created":{"date-parts":[[2017,8,18]],"date-time":"2017-08-18T04:13:26Z","timestamp":1503029606000},"page":"450-472","source":"Crossref","is-referenced-by-count":2,"title":["Incremental Analysis for Probabilistic Programs"],"prefix":"10.1007","author":[{"given":"Jieyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,19]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Arzt, S., Bodden, E.: Reviser: efficiently updating IDE-\/IFDS-based data-flow analyses in response to incremental program changes. In: Proceedings of the 36th International Conference on Software Engineering, pp. 288\u2013298 (2014)","DOI":"10.1145\/2568225.2568243"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-19718-5_5","volume-title":"Programming Languages and Systems","author":"J Borgstr\u00f6m","year":"2011","unstructured":"Borgstr\u00f6m, J., Gordon, A.D., Greenberg, M., Margetson, J., Gael, J.: Measure transformer semantics for Bayesian machine learning. In: Barthe, G. (ed.) ESOP 2011. LNCS, vol. 6602, pp. 77\u201396. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19718-5_5"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Caticha, A., Giffin, A., Mohammad-Djafari, A.: Updating probabilities. In: 18th International Conference on Artificial Intelligence and Pattern Recognition, pp. 31\u201342 (2006)","DOI":"10.1063\/1.2423258"},{"key":"22_CR4","unstructured":"Chaganty, A.T., Nori, A.V., Rajamani, S.K.: Efficiently sampling probabilistic programs via program analysis. In: 16th Artificial Intelligence and Statistics, pp. 153\u2013160 (2013)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-10936-7_6","volume-title":"Static Analysis","author":"A Chakarov","year":"2014","unstructured":"Chakarov, A., Sankaranarayanan, S.: Expectation invariants for probabilistic program loops as fixed points. In: M\u00fcller-Olm, M., Seidl, H. (eds.) SAS 2014. LNCS, vol. 8723, pp. 85\u2013100. Springer, Cham (2014). doi: 10.1007\/978-3-319-10936-7_6"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Chan, H., Darwiche, A.: On the revision of probabilistic beliefs using uncertain evidence. Artif. Intell. 163(1), 67\u201390 (2005)","DOI":"10.1016\/j.artint.2004.09.005"},{"key":"22_CR7","unstructured":"Chib, S., Greenberg, E.: Understanding the metropolis-hastings algorithm. Am. Stat. 49(4), 327\u2013335 (1995)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Claret, G., Rajamani, S.K., Nori, A.V., Gordon, A.D., Borgstr\u00f6m, J.: Bayesian inference using data flow analysis. In: Proceedings of the 9th Joint Meeting on Foundations of Software Engineering, pp. 92\u2013102 (2013)","DOI":"10.1145\/2491411.2491423"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Fan, X., Sui, Y., Liao, X., Xue, J.: Boosting the precision of virtual call integrity protection with partial pointer analysis for C++. In: 26th ACM SIGSOFT International Symposium on Software Testing and Analysis (2017)","DOI":"10.1145\/3092703.3092729"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Gehr, T., Misailovic, S., Vechev, M.: PSI: exact symbolic inference for probabilistic programs. In: 26th International Conference on Computer Aided Verification, pp. 62\u201383 (2016)","DOI":"10.1007\/978-3-319-41528-4_4"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Glynn, P.W., Iglehart, D.L.: Importance sampling for stochastic simulations. Manag. Sci. 35(11), 1367\u20131392 (1989)","DOI":"10.1287\/mnsc.35.11.1367"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Gordon, A.D., Henzinger, T.A., Nori, A.V., Rajamani, S.K.: Probabilistic programming. In: Proceedings of the on Future of Software Engineering, pp. 167\u2013181 (2014)","DOI":"10.1145\/2593882.2593900"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Hastings, W.K.: Monte Carlo sampling methods using Markov chains and their applications. Biometrika 57(1), 97\u2013109 (1970)","DOI":"10.1093\/biomet\/57.1.97"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Hermenegildo, M., Puebla, G., Marriott, K., Stuckey, P.J.: Incremental analysis of constraint logic programs. ACM Trans. Program. Lang. Syst. 22(2), 187\u2013223 (2000)","DOI":"10.1145\/349214.349216"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Hur, C.-K., Nori, A.V., Rajamani, S.K., Samuel, S.: Slicing probabilistic programs. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 133\u2013144 (2014)","DOI":"10.1145\/2666356.2594303"},{"key":"22_CR16","unstructured":"Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques. The MIT Press, Cambridge (2009)"},{"key":"22_CR17","unstructured":"Kullback, S.: Information Theory and Statistics. Dover Publications, New York (1997)"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-37051-9_4","volume-title":"Compiler Construction","author":"Y Lu","year":"2013","unstructured":"Lu, Y., Shang, L., Xie, X., Xue, J.: An incremental points-to analysis with CFL-reachability. In: Jhala, R., Bosschere, K. (eds.) CC 2013. LNCS, vol. 7791, pp. 61\u201381. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-37051-9_4"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"MacKay, D.J.: Introduction to Monte Carlo methods. Learning in Graphical Models, vol. 89, pp. 175\u2013204. Springer, Berlin (1998)","DOI":"10.1007\/978-94-011-5014-9_7"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. J. Comput. Secur. 21(4), 463\u2013532 (2013)","DOI":"10.3233\/JCS-130469"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Miller, A.C., Rice, T.R.: Discrete approximations of probability distributions. Manag. Sci. 29(3), 352\u2013362 (1983)","DOI":"10.1287\/mnsc.29.3.352"},{"key":"22_CR22","unstructured":"Minka, T.P.: Expectation propagation for approximate Bayesian inference. In: Proceedings of the 17th Conference on Uncertainty in Artificial Intelligence, pp. 362\u2013369 (2001)"},{"key":"22_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-45099-3_17","volume-title":"Static Analysis","author":"D Monniaux","year":"2000","unstructured":"Monniaux, D.: Abstract interpretation of probabilistic semantics. In: Palsberg, J. (ed.) SAS 2000. LNCS, vol. 1824, pp. 322\u2013339. Springer, Heidelberg (2000). doi: 10.1007\/978-3-540-45099-3_17"},{"key":"22_CR24","unstructured":"Murphy, K.P., Weiss, Y., Jordan, M.I.: Loopy belief propagation for approximate inference: an empirical study. In: Proceedings of the 15th Conference on Uncertainty in Artificial Intelligence, pp. 467\u2013475 (1999)"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Nori, A.V., Hur, C.-K., Rajamani, S.K., Samuel, S.: R2: an efficient MCMC sampler for probabilistic programs. In: Proceedings of the 29th National Conference on Artificial Intelligence, pp. 2476\u20132482 (2014)","DOI":"10.1609\/aaai.v28i1.9060"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Person, S., Yang, G., Rungta, N., Khurshid, S.: Directed incremental symbolic execution. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 504\u2013515 (2011)","DOI":"10.1145\/1993498.1993558"},{"key":"22_CR27","unstructured":"Pfeffer, A.: Figaro: an object-oriented probabilistic programming language. Charles River Analytics Technical report 137:96 (2009)"},{"key":"22_CR28","unstructured":"Plummer, M., et al.: Jags: a program for analysis of Bayesian graphical models using Gibbs sampling. In: Proceedings of the 3rd International Workshop on Distributed Statistical Computing, p. 125 (2003)"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Sankaranarayanan, S., Chakarov, A., Gulwani, S.: Static analysis for probabilistic programs: inferring whole program properties from finitely many paths. In: Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 447\u2013458 (2013)","DOI":"10.1145\/2491956.2462179"},{"key":"22_CR30","unstructured":"Sanner, S., McAllester, D.: Affine algebraic decision diagrams (AADDs) and their application to structured probabilistic inference. In: Proceedings of the 19th International Joint Conference on Artificial Intelligence, pp. 1384\u20131390 (2005)"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Shang, L., Lu, Y., Xue, J.: Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience. In: Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 270\u2013273 (2012)","DOI":"10.1145\/2351676.2351720"},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Sui, Y., Xue, J.: On-demand strong update analysis via value-flow refinement. In: Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 460\u2013473 (2016)","DOI":"10.1145\/2950290.2950296"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Sui, Y., Xue, J.: SVF: interprocedural static value-flow analysis in LLVM. In: Proceedings of the 25th International Conference on Compiler Construction, pp. 265\u2013266 (2016)","DOI":"10.1145\/2892208.2892235"},{"key":"22_CR34","unstructured":"Vall\u00e9e-Rai, R., Co, P., Gagnon, E., Hendren, L., Lam, P., Sundaresan, V.: Soot - a Java bytecode optimization framework. In: Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research, p. 13 (1999)"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Wainwright, M.J., Jordan, M.I., et al.: Graphical models, exponential families, and variational inference. Found. Trends\u00ae Mach. Learn. 1(1\u20132), 1\u2013305 (2008)","DOI":"10.1561\/2200000001"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Wanke, C., Greenbaum, D.: Incremental, probabilistic decision making for en route traffic management. Air Traffic Cont. Q. 15(4), 299\u2013319 (2007)","DOI":"10.2514\/atcq.15.4.299"},{"key":"22_CR37","unstructured":"Yue, A., Liu, W.: Revising imprecise probabilistic beliefs in the framework of probabilistic logic programming. In: Proceedings of the 23rd National Conference on Artificial Intelligence, pp. 590\u2013596 (2008)"},{"key":"22_CR38","doi-asserted-by":"crossref","unstructured":"Zhan, S., Huang, J.: ECHO: instantaneous in situ race detection in the IDE. In: Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 775\u2013786 (2016)","DOI":"10.1145\/2950290.2950332"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66706-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T10:47:49Z","timestamp":1659350869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66706-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319667058","9783319667065"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66706-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}