{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:10:09Z","timestamp":1744078209792,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642335112"},{"type":"electronic","value":"9783642335129"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33512-9_10","type":"book-chapter","created":{"date-parts":[[2012,9,8]],"date-time":"2012-09-08T07:18:53Z","timestamp":1347088733000},"page":"107-120","source":"Crossref","is-referenced-by-count":4,"title":["Efficient Probabilistic Model Checking of Systems with Ranged Probabilities"],"prefix":"10.1007","author":[{"given":"Khalil","family":"Ghorbal","sequence":"first","affiliation":[]},{"given":"Parasara Sridhar","family":"Duggirala","sequence":"additional","affiliation":[]},{"given":"Vineet","family":"Kahlon","sequence":"additional","affiliation":[]},{"given":"Franjo","family":"Ivan\u010di\u0107","sequence":"additional","affiliation":[]},{"given":"Aarti","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","volume-title":"A linear-time algorithm for the weighted median problem","author":"C. Bleich","year":"1983","unstructured":"Bleich, C., Overton, M.L.: A linear-time algorithm for the weighted median problem. Courant Institute of Mathematical Sciences, New York University, New York (1983)"},{"key":"10_CR2","unstructured":"Comba, J.L.D., Stolfi, J.: Affine arithmetic and its applications to computer graphics. In: SIBGRAPI 1993 (1993)"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s00180-006-0268-5","volume":"21","author":"S. Corsaro","year":"2006","unstructured":"Corsaro, S., Marino, M.: Interval linear systems: the state of the art. Computational Statistics\u00a021, 365\u2013384 (2006)","journal-title":"Computational Statistics"},{"key":"10_CR4","unstructured":"de Figueiredo, L.H., Stolfi, J.: Self-Validated Numerical Methods and Applications. Brazilian Mathematics Colloquium monographs. IMPA\/CNPq, Rio de Janeiro, Brazil (1997)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. CRC Press (1993)","DOI":"10.1007\/978-1-4899-4541-9"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/11691617_5","volume-title":"Model Checking Software","author":"H. Fecher","year":"2006","unstructured":"Fecher, H., Leucker, M., Wolf, V.: Don\u2019t Know in Probabilistic Systems. In: Valmari, A. (ed.) SPIN 2006. LNCS, vol.\u00a03925, pp. 71\u201388. Springer, Heidelberg (2006)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-14295-6_22","volume-title":"Computer Aided Verification","author":"K. Ghorbal","year":"2010","unstructured":"Ghorbal, K., Goubault, E., Putot, S.: A Logical Product Approach to Zonotope Intersection. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol.\u00a06174, pp. 212\u2013226. Springer, Heidelberg (2010)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-31954-2_19","volume-title":"Hybrid Systems: Computation and Control","author":"A. Girard","year":"2005","unstructured":"Girard, A.: Reachability of Uncertain Linear Systems Using Zonotopes. In: Morari, M., Thiele, L. (eds.) HSCC 2005. LNCS, vol.\u00a03414, pp. 291\u2013305. Springer, Heidelberg (2005)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11823230_3","volume-title":"Static Analysis","author":"\u00c9. Goubault","year":"2006","unstructured":"Goubault, \u00c9., Putot, S.: Static Analysis of Numerical Algorithms. In: Yi, K. (ed.) SAS 2006. LNCS, vol.\u00a04134, pp. 18\u201334. Springer, Heidelberg (2006)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/BF01933165","volume":"21","author":"E. Hansen","year":"1981","unstructured":"Hansen, E., Sengupta, S.: Bounding solutions of systems of equations using interval analysis. BIT Numerical Mathematics\u00a021, 203\u2013211 (1981)","journal-title":"BIT Numerical Mathematics"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BF01211866","volume":"6","author":"H. Hansson","year":"1994","unstructured":"Hansson, H., Jonsson, B.: A logic for reasoning about time and reliability. Formal Aspects of Computing\u00a06, 512\u2013535 (1994)","journal-title":"Formal Aspects of Computing"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-24622-0_8","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"T. H\u00e9rault","year":"2004","unstructured":"H\u00e9rault, T., Lassaigne, R., Magniette, F., Peyronnet, S.: Approximate Probabilistic Model Checking. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol.\u00a02937, pp. 73\u201384. Springer, Heidelberg (2004)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0024-3795(89)90004-9","volume":"126","author":"Jiri","year":"1989","unstructured":"Jiri, Rohn: Systems of linear interval equations. Linear Algebra and its Applications\u00a0126, 39\u201378 (1989)","journal-title":"Linear Algebra and its Applications"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Jonsson, B., Larsen, K.: Specification and refinement of probabilistic processes. In: LICS, pp. 266\u2013277 (July 1991)","DOI":"10.1109\/LICS.1991.151651"},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.jlap.2012.03.007","volume":"81","author":"J.-P. Katoen","year":"2012","unstructured":"Katoen, J.-P., Klink, D., Leucker, M., Wolf, V.: Three-valued abstraction for probabilistic systems. Journal of Logic and Algebraic Programming\u00a081(4), 356\u2013389 (2012)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1014745904458","volume":"8","author":"I.O. Kozine","year":"2002","unstructured":"Kozine, I.O., Utkin, L.V.: Interval-valued finite markov chains. Reliable Computing\u00a08, 97\u2013113 (2002)","journal-title":"Reliable Computing"},{"key":"10_CR17","unstructured":"Makhorin, A.: The GNU Linear Programming Kit (GLPK) (2000)"},{"key":"10_CR18","unstructured":"Moore, R.E., Yang, C.T.: Interval analysis I. Technical Report LMSD-285875, Lockheed Missiles and Space Division, Sunnyvale, CA, USA (1959)"},{"key":"10_CR19","unstructured":"Rump, S.M.: Profil\/bias"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/11513988_26","volume-title":"Computer Aided Verification","author":"K. Sen","year":"2005","unstructured":"Sen, K., Viswanathan, M., Agha, G.: On Statistical Model Checking of Stochastic Systems. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 266\u2013280. Springer, Heidelberg (2005)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-45657-0_17","volume-title":"Computer Aided Verification","author":"H.L.S. Younes","year":"2002","unstructured":"Younes, H.L.S., Simmons, R.G.: Probabilistic Verification of Discrete Event Systems Using Acceptance Sampling. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.\u00a02404, pp. 223\u2013235. Springer, Heidelberg (2002)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Zuliani, P., Platzer, A., Clarke, E.M.: Bayesian statistical model checking with application to Simulink\/Stateflow verification. In: HSCC, pp. 243\u2013252 (2010)","DOI":"10.21236\/ADA531406"}],"container-title":["Lecture Notes in Computer Science","Reachability Problems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33512-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T01:51:56Z","timestamp":1744077116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33512-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642335112","9783642335129"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33512-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}