{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:41Z","timestamp":1763468201424,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,14]],"date-time":"2014-07-14T00:00:00Z","timestamp":1405296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,14]]},"DOI":"10.1145\/2603088.2603097","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T13:21:45Z","timestamp":1406553705000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Satisfiability modulo counting"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Fredrikson","sequence":"first","affiliation":[{"name":"University of Wisconsin, Madison"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison"}]}],"member":"320","published-online":{"date-parts":[[2014,7,14]]},"reference":[{"volume-title":"The Economist","year":"2012","key":"e_1_3_2_1_1_1","unstructured":"Insurance data : Very personal finance . The Economist , June 2012 . Insurance data: Very personal finance. The Economist, June 2012."},{"key":"e_1_3_2_1_2_1","unstructured":"M. Abramson C. Audet G. Couture J. Dennis Jr. S. Le Digabel and C. Tribes. The NOMAD project. http:\/\/www.gerad.ca\/nomad.  M. Abramson C. Audet G. Couture J. Dennis Jr. S. Le Digabel and C. Tribes. The NOMAD project. http:\/\/www.gerad.ca\/nomad."},{"key":"e_1_3_2_1_3_1","volume-title":"Logic, language, information and computation","author":"Areces C.","year":"2010","unstructured":"C. Areces , G. Hoffmann , and A. Denis . Modal logics with counting . In Logic, language, information and computation , 2010 . C. Areces, G. Hoffmann, and A. Denis. Modal logics with counting. In Logic, language, information and computation, 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"Advances in Artificial Intelligence.","author":"Baader F.","year":"1994","unstructured":"F. Baader , M. Buchheit , and B. Hollunder . Cardinality restrictions on concepts . In Advances in Artificial Intelligence. 1994 . F. Baader, M. Buchheit, and B. Hollunder. Cardinality restrictions on concepts. In Advances in Artificial Intelligence. 1994."},{"key":"e_1_3_2_1_5_1","volume-title":"Oakland","author":"Backes M.","year":"2009","unstructured":"M. Backes , B. K\u00f6pf , and A. Rybalchenko . Automatic discovery and quantification of information leaks . In Oakland , 2009 . M. Backes, B. K\u00f6pf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In Oakland, 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103670"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.19.4.769"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645502.757731"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378859"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.11.002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008069920230"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646589.697342"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_18_1","author":"Di Pierro A.","year":"2004","unstructured":"A. Di Pierro , C. Hankin , and H. Wiklicky . Approximate non-interference. Journal of Computer Security , Jan. 2004 . A. Di Pierro, C. Hankin, and H. Wiklicky. Approximate non-interference. Journal of Computer Security, Jan. 2004.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_2_1_19_1","volume-title":"New York Times.","author":"Duhigg C.","year":"2012","unstructured":"C. Duhigg . How companies learn your secrets . New York Times. February 16, 2012 . C. Duhigg. How companies learn your secrets. New York Times. February 16, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429113"},{"key":"e_1_3_2_1_22_1","volume-title":"Handbook of Satisfiability.","author":"Gomes C. P.","year":"2009","unstructured":"C. P. Gomes , A. Sabharwal , and B. Selman . Model counting . In Handbook of Satisfiability. 2009 . C. P. Gomes, A. Sabharwal, and B. Selman. Model counting. In Handbook of Satisfiability. 2009."},{"key":"e_1_3_2_1_23_1","volume-title":"Finite Model Theory and Its Applications","author":"Gr\u00e4del E.","year":"2005","unstructured":"E. Gr\u00e4del , P. G. Kolaitis , L. Libkin , M. Marx , J. Spencer , M. Y. Vardi , Y. Venema , and S. Weinstein . Finite Model Theory and Its Applications . Springer-Verlag New York, Inc. , 2005 . E. Gr\u00e4del, P. G. Kolaitis, L. Libkin, M. Marx, J. Spencer, M. Y. Vardi, Y. Venema, and S. Weinstein. Finite Model Theory and Its Applications. Springer-Verlag New York, Inc., 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-56992-8_15"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(95)00026-S"},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX Security","author":"Haeberlen A.","year":"2011","unstructured":"A. Haeberlen , B. C. Pierce , and A. Narayan . Differential privacy under fire . In USENIX Security , 2011 . A. Haeberlen, B. C. Pierce, and A. Narayan. Differential privacy under fire. In USENIX Security, 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920300"},{"key":"e_1_3_2_1_28_1","volume-title":"Workshop on Quantitative Aspects in Security Assurance","author":"Klebanov V.","year":"2012","unstructured":"V. Klebanov . Precise quantitative information flow analysis using symbolic model counting . In Workshop on Quantitative Aspects in Security Assurance , 2012 . V. Klebanov. Precise quantitative information flow analysis using symbolic model counting. In Workshop on Quantitative Aspects in Security Assurance, 2012."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40196-1_16"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_40"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/788021.788982"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-74503-9","volume-title":"Linear and Nonlinear Programming","author":"Luenberger D.","year":"2008","unstructured":"D. Luenberger and Y. Ye . Linear and Nonlinear Programming . 2008 . D. Luenberger and Y. Ye. Linear and Nonlinear Programming. 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594331"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02959-2_33"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375606"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_1_37_1","volume-title":"VMCAI.","author":"Moura L.","year":"2013","unstructured":"L. Moura and D. Jovanovi\u0107 . A model-constructing satisfiability calculus . In VMCAI. 2013 . L. Moura and D. Jovanovi\u0107. A model-constructing satisfiability calculus. In VMCAI. 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217856.1217859"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178254"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-37621-7_9"},{"key":"e_1_3_2_1_41_1","volume-title":"AAAI","author":"Sang T.","year":"2005","unstructured":"T. Sang , P. Beame , and H. Kautz . Solving Bayesian networks by weighted model counting . In AAAI , 2005 . T. Sang, P. Beame, and H. Kautz. Solving Bayesian networks by weighted model counting. In AAAI, 2005."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_43_1","author":"Valentino-Devries J.","year":"2012","unstructured":"J. Valentino-Devries , J. Singer-Vine , and A. Soltani . Websites vary prices, deals based on users' information. Wall Street Journal. December 24, 2012 . J. Valentino-Devries, J. Singer-Vine, and A. Soltani. Websites vary prices, deals based on users' information. Wall Street Journal. December 24, 2012.","journal-title":"Websites vary prices, deals based on users' information. Wall Street Journal."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-006-1231-0"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325729"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/872752.873524"}],"event":{"name":"CSL-LICS '14: JOINT MEETING OF the Twenty-Third EACSL Annual Conference on COMPUTER SCIENCE LOGIC","sponsor":["SIGLOG ACM Special Interest Group on Logic and Computation","EACSL European Association for Computer Science Logic","IEEE-CS\\DATC IEEE Computer Society","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Vienna Austria","acronym":"CSL-LICS '14"},"container-title":["Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM\/IEEE Symposium on Logic in Computer Science (LICS)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2603088.2603097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2603088.2603097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:34Z","timestamp":1750278154000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2603088.2603097"}},"subtitle":["a new approach for analyzing privacy properties"],"short-title":[],"issued":{"date-parts":[[2014,7,14]]},"references-count":46,"alternative-id":["10.1145\/2603088.2603097","10.1145\/2603088"],"URL":"https:\/\/doi.org\/10.1145\/2603088.2603097","relation":{},"subject":[],"published":{"date-parts":[[2014,7,14]]},"assertion":[{"value":"2014-07-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}