{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:40:45Z","timestamp":1725493245878},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540766483"},{"type":"electronic","value":"9783540766506"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-76650-6_13","type":"book-chapter","created":{"date-parts":[[2007,10,26]],"date-time":"2007-10-26T07:12:49Z","timestamp":1193382769000},"page":"212-231","source":"Crossref","is-referenced-by-count":2,"title":["Automating Refinement Checking in Probabilistic System Design"],"prefix":"10.1007","author":[{"given":"C.","family":"Gonzalia","sequence":"first","affiliation":[]},{"given":"A.","family":"McIver","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","DOI":"10.1007\/11591191_37","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"A. McIver","year":"2005","unstructured":"McIver, A., Weber, T.: Towards automated proof support for probabilistic distributed systems. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol.\u00a03835, Springer, Heidelberg (2005)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/11526841_9","volume-title":"FM 2005","author":"O. Celiku","year":"2005","unstructured":"Celiku, O., McIver, A.: Compositional specification and analysis of cost-based properties in probabilistic programs. In: Fitzgerald, J.A., Hayes, I.J., Tarlecki, A. (eds.) FM 2005. LNCS, vol.\u00a03582, pp. 107\u2013122. Springer, Heidelberg (2005)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/0020-0190(90)90072-6","volume":"36","author":"E. Dijkstra","year":"1990","unstructured":"Dijkstra, E.: Making a fair roulette from a possibly biased coin. Information Processing Letters\u00a036, 193 (1990)","journal-title":"Information Processing Letters"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/11817963_11","volume-title":"CAV 2006","author":"B. Dutertre","year":"2006","unstructured":"Dutertre, B., de Moura, L.: A fast linear-arithmetic solver for DPLL(T)*. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol.\u00a04144, pp. 81\u201394. Springer, Heidelberg (2006)"},{"key":"13_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4054-9","volume-title":"Competitive Markov Decision Processes: Theory, Algorithms, and Applications","author":"J. Filar","year":"1996","unstructured":"Filar, J., Vrieze, O.J.: Competitive Markov Decision Processes: Theory, Algorithms, and Applications. Springer, Heidelberg (1996)"},{"key":"13_CR6","unstructured":"Gonzalia, C.: Source and scripts for the normal form analyser and distribution generator www.ics.mq.edu.au\/~carlos"},{"key":"13_CR7","volume-title":"Symposium on Language Issues in Programming Environments","author":"D. Gries","year":"1983","unstructured":"Gries, D., Prins, J.: A new notion of encapsulation. In: Symposium on Language Issues in Programming Environments, ACM Press, New York (1983)"},{"key":"13_CR8","unstructured":"Grimmett, G.R., Welsh, D.: Probability: an Introduction. Oxford Science Publications (1986)"},{"issue":"4","key":"13_CR9","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00165-004-0037-6","volume":"16","author":"S. Hallerstede","year":"2004","unstructured":"Hallerstede, S., Butler, M.: Performance analysis of probabilistic action systems. Formal Aspects of Computing\u00a016(4), 313\u2013331 (2004)","journal-title":"Formal Aspects of Computing"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/S0167-6423(96)00019-6","volume":"28","author":"J. He","year":"1997","unstructured":"He, J., Seidel, K., McIver, A.K.: Probabilistic models for the guarded command language. Science of Computer Programming\u00a028, 171\u2013192 (1997)","journal-title":"Science of Computer Programming"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","first-page":"252","volume-title":"ZB 2005","author":"T.S. Hoang","year":"2005","unstructured":"Hoang, T.S., Morgan, C.C., McIver, A., Robinson, K.A., Jin, Z.D: Refinement in probabilistic B: Foundation and case study. In: Treharne, H., King, S., Henson, M.C., Schneider, S. (eds.) ZB 2005. LNCS, vol.\u00a03455, pp. 252\u2013273. Springer, Heidelberg (2005)"},{"key":"13_CR12","unstructured":"Hoang, T.S.: The Development of a Probabilistic B-Method and a Supporting Toolkit. PhD thesis, School of Computer Science and Engineering (2005)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Hurd, J., McIver, A.K., Morgan, C.C.: Probabilistic guarded commands mechanised in HOL. In: Theoretical Computer Science, pp. 96\u2013112 (2005)","DOI":"10.1016\/j.tcs.2005.08.005"},{"key":"13_CR14","first-page":"186","volume-title":"Proceedings of the IEEE 4th Annual Symposium on Logic in Computer Science","author":"C. Jones","year":"1989","unstructured":"Jones, C., Plotkin, G.: A probabilistic powerdomain of evaluations. In: Proceedings of the IEEE 4th Annual Symposium on Logic in Computer Science, pp. 186\u2013195. IEEE Computer Society Press, Los Alamitos (1989)"},{"key":"13_CR15","unstructured":"Lazic, R.: A Semantic Study of Data Independence with Applications to Model Checking. PhD thesis, Programming Research Group (1999)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/11813040_10","volume-title":"FM 2006","author":"A. McIver","year":"2006","unstructured":"McIver, A.: Quantitative refinement and model checking for the analysis of probabilistic systems. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol.\u00a04085, pp. 131\u2013146. Springer, Heidelberg (2006)"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Relmics\/AKA 2006","author":"A. McIver","year":"2006","unstructured":"McIver, A., Cohen, E., Morgan, C.: Using probabilistic kleene algebra for protocol verification. In: Schmidt, R.A. (ed.) RelMiCS\/AKA 2006. LNCS, vol.\u00a04136, Springer, Heidelberg (2006)"},{"key":"13_CR18","volume-title":"Technical Monographs in Computer Science","author":"A. McIver","year":"2004","unstructured":"McIver, A., Morgan, C.: Abstraction, Refinement and Proof for Probabilistic Systems. In: Technical Monographs in Computer Science, Springer, New York (2004)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1007\/11901433_21","volume-title":"ICFEM 2006","author":"L. Meinicke","year":"2006","unstructured":"Meinicke, L., Hayes, I.J.: Reasoning algebraically about probabilistic loops. In: Liu, Z., He, J. (eds.) ICFEM 2006. LNCS, vol.\u00a04260, pp. 380\u2013399. Springer, Heidelberg (2006)"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"SAS 2000","author":"D. Monniaux","year":"2000","unstructured":"Monniaux, D.: Abstract interpretation of probabilistic semantics. In: Palsberg, J. (ed.) SAS 2000. LNCS, vol.\u00a01824, Springer, Heidelberg (2000)"},{"key":"13_CR21","unstructured":"Morgan, C.: Private communication. The Lamington model: a probabilistic model with miracles (1995)"},{"issue":"3","key":"13_CR22","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1145\/44501.44503","volume":"10","author":"C.C. Morgan","year":"1988","unstructured":"Morgan, C.C.: The specification statement. ACM Transactions on Programming Languages and Systems\u00a010(3), 403\u2013419 (1988)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"13_CR23","volume-title":"Programming from Specifications","author":"C.C. Morgan","year":"1994","unstructured":"Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Englewood Cliffs (1994)","edition":"2"},{"key":"13_CR24","unstructured":"PRISM. Probabilistic symbolic model checker, www.cs.bham.ac.uk\/~dxp\/prism"},{"issue":"1","key":"13_CR25","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/0022-0000(82)90010-1","volume":"25","author":"M.O. Rabin","year":"1982","unstructured":"Rabin, M.O.: N-process mutual exclusion with bounded waiting by 4log2n-valued shared variable. Journal of Computer and System Sciences\u00a025(1), 66\u201375 (1982)","journal-title":"Journal of Computer and System Sciences"},{"issue":"3","key":"13_CR26","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/s00165-006-0004-5","volume":"18","author":"S. Schneider","year":"2006","unstructured":"Schneider, S., Hoang, T.S., Robinson, K.A., Treharne, H.: Tank monitoring: a case study in pAMN. Formal Aspects of Computing\u00a018(3), 308\u2013328 (2006)","journal-title":"Formal Aspects of Computing"},{"key":"13_CR27","unstructured":"Sere, K., Troubitsyna, E.: Probabilities in action systems. In: Proc. of the 8th Nordic Workshop on Programming Theory (1996)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76650-6_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:57:13Z","timestamp":1619521033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76650-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540766483","9783540766506"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76650-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}