{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:39:21Z","timestamp":1757587161950,"version":"3.37.3"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179424","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"3314-3331","source":"Crossref","is-referenced-by-count":2,"title":["Adaptive Risk-Limiting Comparison Audits"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Fuller","sequence":"first","affiliation":[{"name":"University of Connecticut &#x2013; Voting Technology Research Center"}]},{"given":"Abigail","family":"Harrison","sequence":"additional","affiliation":[{"name":"University of Connecticut &#x2013; Voting Technology Research Center"}]},{"given":"Alexander","family":"Russell","sequence":"additional","affiliation":[{"name":"University of Connecticut &#x2013; Voting Technology Research Center"}]}],"member":"263","reference":[{"year":"2005","key":"ref1","article-title":"Voluntary voting system guidelines"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17226\/25120"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.56"},{"article-title":"Knowing it\u2019s right, part two. risk-limiting audit implementation workbook","year":"2019","author":"Morrell","key":"ref4"},{"article-title":"Risk-limiting post-election audits: Why and how","year":"2012","author":"Bretschneider","key":"ref5"},{"article-title":"Risk-limiting audits: A practical systematization of knowledge","volume-title":"International Joint Conference on Electronic Voting","author":"Bernhard","key":"ref6"},{"article-title":"Auditing a collection of races simultaneously","year":"2009","author":"Stark","key":"ref7"},{"article-title":"Super-simple simultaneous single-ballot risk-limiting audits","volume-title":"EVT\/WOTE","author":"Stark","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2202\/2151-7509.1031"},{"article-title":"Bravo: Ballot-polling risk-limiting audits to verify outcomes","volume-title":"EVT\/WOTE","author":"Lindeman","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00419-4_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_23"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86942-7_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86942-7_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2034190"},{"article-title":"Alpha: Audit that learns from previously hand-audited ballots","year":"2022","author":"Stark","key":"ref17"},{"year":"2019","key":"ref18","article-title":"Pilot implementation study of risk-limiting audit methods in the state of Rhode Island"},{"article-title":"Rhode island presidential risk-limiting audit, november 19-24, 2020 (brief report)","year":"2020","author":"Lindeman","key":"ref19"},{"year":"2022","key":"ref20","article-title":"Risk-limiting audit recommendations for connecticut"},{"year":"2020","key":"ref21","article-title":"Precinct-level election results"},{"article-title":"Computer assisted post election audits","volume-title":"State Certification Testing of Voting Systems National Conference","author":"Antonyan","key":"ref22"},{"article-title":"rlacalc - calculate statistical parameters for risk-limiting post-election audits","year":"2022","author":"McBurnett","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1443314"},{"year":"2020","key":"ref25","article-title":"2020 general election risk-limiting audit discrepancy report"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1214\/08-aoas161"},{"article-title":"Principles and best practices for post-election tabulation audits","year":"2018","author":"Garland","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1411219"},{"key":"ref29","first-page":"1","article-title":"Single-ballot risk-limiting audits using convex optimization","volume-title":"Proceedings of the 2010 International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections","author":"Checkoway"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2034210"},{"article-title":"Limiting risk by turning manifest phantoms into evil zombies","year":"2012","author":"Banuelos","key":"ref31"},{"article-title":"Adaptive risk-limiting ballot comparison audits","year":"2022","author":"Harrison","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_18"},{"article-title":"Tools for comparison risk-limiting election audits","year":"2022","author":"Stark","key":"ref34"},{"article-title":"Statistical analysis of post-election audit data for the november 03, 2020 presidential elections","year":"2021","author":"Russell","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813658"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179424.pdf?arnumber=10179424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:14:15Z","timestamp":1721452455000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179424","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}