{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:48:19Z","timestamp":1772930899066,"version":"3.50.1"},"reference-count":72,"publisher":"Association for Computing Machinery (ACM)","issue":"OOPSLA","license":[{"start":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T00:00:00Z","timestamp":1507766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1704117 and 1566015"],"award-info":[{"award-number":["1704117 and 1566015"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Program. Lang."],"published-print":{"date-parts":[[2017,10,12]]},"abstract":"<jats:p>With the range and sensitivity of algorithmic decisions expanding at a break-neck speed, it is imperative that we aggressively investigate fairness and bias in decision-making programs. First, we show that a number of recently proposed formal definitions of fairness can be encoded as probabilistic program properties. Second, with the goal of enabling rigorous reasoning about fairness, we design a novel technique for verifying probabilistic properties that admits a wide class of decision-making programs. Third, we present FairSquare, the first verification tool for automatically certifying that a program meets a given fairness property. We evaluate FairSquare on a range of decision-making programs. Our evaluation demonstrates FairSquare\u2019s ability to verify fairness for a range of different programs, which we show are out-of-reach for state-of-the-art program analysis techniques.<\/jats:p>","DOI":"10.1145\/3133904","type":"journal-article","created":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T15:15:45Z","timestamp":1507907745000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["FairSquare: probabilistic verification of program fairness"],"prefix":"10.1145","volume":"1","author":[{"given":"Aws","family":"Albarghouthi","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Loris","family":"D'Antoni","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Samuel","family":"Drews","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Aditya V.","family":"Nori","sequence":"additional","affiliation":[{"name":"Microsoft Research, UK"}]}],"member":"320","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2746078"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_9"},{"key":"e_1_2_1_3_1","unstructured":"Julia Angwin Jeff Larson Surya Mattu and Lauren Kirchner. 2016. Machine Bias: There\u2019s Software Used Across the Country to Predict Future Criminals. And it\u2019s Biased Against Blacks. https:\/\/www.propublica.org\/article\/ machine- bias- risk- assessments- in- criminal- sentencing . (May 2016). (Accessed on 06\/18\/2016).  Julia Angwin Jeff Larson Surya Mattu and Lauren Kirchner. 2016. Machine Bias: There\u2019s Software Used Across the Country to Predict Future Criminals. And it\u2019s Biased Against Blacks. https:\/\/www.propublica.org\/article\/ machine- bias- risk- assessments- in- criminal- sentencing . (May 2016). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46430-1_6"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108813"},{"key":"e_1_2_1_6_1","volume-title":"Big data\u2019s disparate impact. Available at SSRN 2477899","author":"Barocas Solon","year":"2014","unstructured":"Solon Barocas and Andrew D Selbst . 2014. Big data\u2019s disparate impact. Available at SSRN 2477899 ( 2014 ). Solon Barocas and Andrew D Selbst. 2014. Big data\u2019s disparate impact. Available at SSRN 2477899 (2014)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310735"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.36"},{"key":"e_1_2_1_9_1","volume-title":"Measuring Neural Net Robustness with Constraints. CoRR abs\/1605.07262","author":"Bastani Osbert","year":"2016","unstructured":"Osbert Bastani , Yani Ioannou , Leonidas Lampropoulos , Dimitrios Vytiniotis , Aditya Nori , and Antonio Criminisi . 2016. Measuring Neural Net Robustness with Constraints. CoRR abs\/1605.07262 ( 2016 ). http:\/\/arxiv.org\/abs\/1605.07262 Osbert Bastani, Yani Ioannou, Leonidas Lampropoulos, Dimitrios Vytiniotis, Aditya Nori, and Antonio Criminisi. 2016. Measuring Neural Net Robustness with Constraints. CoRR abs\/1605.07262 (2016). http:\/\/arxiv.org\/abs\/1605.07262"},{"key":"e_1_2_1_10_1","volume-title":"Algorithms in Real Algebraic Geometry (Algorithms and Computation in Mathematics)","author":"Basu Saugata","unstructured":"Saugata Basu , Richard Pollack , and Marie-Fran\u00e7oise Roy . 2006. Algorithms in Real Algebraic Geometry (Algorithms and Computation in Mathematics) . Springer-Verlag New York, Inc. , Secaucus, NJ, USA . Saugata Basu, Richard Pollack, and Marie-Fran\u00e7oise Roy. 2006. Algorithms in Real Algebraic Geometry (Algorithms and Computation in Mathematics). Springer-Verlag New York, Inc., Secaucus, NJ, USA."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016376"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015","author":"Belle Vaishak","year":"2015","unstructured":"Vaishak Belle , Andrea Passerini , and Guy Van den Broeck . 2015 a. Probabilistic Inference in Hybrid Domains by Weighted Model Integration . In Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015 , Buenos Aires, Argentina , July 25-31, 2015. 2770\u20132776. http:\/\/ijcai.org\/Abstract\/15\/392 Vaishak Belle, Andrea Passerini, and Guy Van den Broeck. 2015a. Probabilistic Inference in Hybrid Domains by Weighted Model Integration. In Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015. 2770\u20132776. http:\/\/ijcai.org\/Abstract\/15\/392"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 31st Conference on Uncertainty in Artificial Intelligence (UAI).","author":"Belle Vaishak","year":"2015","unstructured":"Vaishak Belle , Guy Van den Broeck , and Andrea Passerini . 2015 b. Hashing-based approximate probabilistic inference in hybrid domains . In Proceedings of the 31st Conference on Uncertainty in Artificial Intelligence (UAI). Vaishak Belle, Guy Van den Broeck, and Andrea Passerini. 2015b. Hashing-based approximate probabilistic inference in hybrid domains. In Proceedings of the 31st Conference on Uncertainty in Artificial Intelligence (UAI)."},{"key":"e_1_2_1_14_1","volume-title":"LAPD-style. https:\/\/www.theguardian.com\/cities\/2014\/jun\/25\/ predicting- crime- lapd- los- angeles- police- data- analysis- algorithm- minority- report . (June","author":"Berg Nate","year":"2014","unstructured":"Nate Berg . 2014. Predicting crime , LAPD-style. https:\/\/www.theguardian.com\/cities\/2014\/jun\/25\/ predicting- crime- lapd- los- angeles- police- data- analysis- algorithm- minority- report . (June 2014 ). ( Accessed on 06\/18\/2016). Nate Berg. 2014. Predicting crime, LAPD-style. https:\/\/www.theguardian.com\/cities\/2014\/jun\/25\/ predicting- crime- lapd- los- angeles- police- data- analysis- algorithm- minority- report . (June 2014). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_15_1","volume-title":"Pattern recognition. Machine Learning 128","author":"Bishop Christopher M","year":"2006","unstructured":"Christopher M Bishop . 2006. Pattern recognition. Machine Learning 128 ( 2006 ). Christopher M Bishop. 2006. Pattern recognition. Machine Learning 128 (2006)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48983-5_8"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/968708.968710"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0190-x"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509546"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535859"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025131"},{"key":"e_1_2_1_22_1","volume-title":"Understanding the metropolis-hastings algorithm. The american statistician 49, 4","author":"Chib Siddhartha","year":"1995","unstructured":"Siddhartha Chib and Edward Greenberg . 1995. Understanding the metropolis-hastings algorithm. The american statistician 49, 4 ( 1995 ), 327\u2013335. Siddhartha Chib and Edward Greenberg. 1995. Understanding the metropolis-hastings algorithm. The american statistician 49, 4 (1995), 327\u2013335."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_26"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491423"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of 37th IEEE Symposium on Security and Privacy.","author":"Datta Anupam","year":"2016","unstructured":"Anupam Datta , Shayak Sen , and Yair Zick . 2016 . Algorithmic Transparency via Quantitative Input Influence . In Proceedings of 37th IEEE Symposium on Security and Privacy. Anupam Datta, Shayak Sen, and Yair Zick. 2016. Algorithmic Transparency via Quantitative Input Influence. In Proceedings of 37th IEEE Symposium on Security and Privacy."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0007"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110170.2110175"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090255"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/102782.102783"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217060"},{"key":"e_1_2_1_35_1","volume-title":"Code of Federal Regulations. https:\/\/www.gpo.gov\/fdsys\/pkg\/CFR- 2014- title29- vol4\/xml\/ CFR- 2014- title29- vol4- part1607.xml . (July","author":"EEOC.","year":"2014","unstructured":"EEOC. 2014. Code of Federal Regulations. https:\/\/www.gpo.gov\/fdsys\/pkg\/CFR- 2014- title29- vol4\/xml\/ CFR- 2014- title29- vol4- part1607.xml . (July 2014 ). ( Accessed on 06\/18\/2016). EEOC. 2014. Code of Federal Regulations. https:\/\/www.gpo.gov\/fdsys\/pkg\/CFR- 2014- title29- vol4\/xml\/ CFR- 2014- title29- vol4- part1607.xml . (July 2014). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_36_1","unstructured":"Virginia Eubanks. 2015. The dangers of letting algorithms enforce policy. http:\/\/www.slate.com\/articles\/technology\/ future_tense\/2015\/04\/the_dangers_of _letting_algorithms_enforce_policy.html . (April 2015). (Accessed on 06\/18\/2016).  Virginia Eubanks. 2015. The dangers of letting algorithms enforce policy. http:\/\/www.slate.com\/articles\/technology\/ future_tense\/2015\/04\/the_dangers_of _letting_algorithms_enforce_policy.html . (April 2015). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783311"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486870"},{"key":"e_1_2_1_39_1","volume-title":"On the (im)possibility of fairness. CoRR abs\/1609.07236","author":"Friedler Sorelle A.","year":"2016","unstructured":"Sorelle A. Friedler , Carlos Scheidegger , and Suresh Venkatasubramanian . 2016. On the (im)possibility of fairness. CoRR abs\/1609.07236 ( 2016 ). http:\/\/arxiv.org\/abs\/1609.07236 Sorelle A. Friedler, Carlos Scheidegger, and Suresh Venkatasubramanian. 2016. On the (im)possibility of fairness. CoRR abs\/1609.07236 (2016). http:\/\/arxiv.org\/abs\/1609.07236"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41528-4_4"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336773"},{"key":"e_1_2_1_42_1","volume-title":"UAI 2008, Proceedings of the 24th Conference in Uncertainty in Artificial Intelligence","author":"Goodman Noah D.","year":"2008","unstructured":"Noah D. Goodman , Vikash K. Mansinghka , Daniel M. Roy , Keith Bonawitz , and Joshua B. Tenenbaum . 2008. Church: a language for generative models . In UAI 2008, Proceedings of the 24th Conference in Uncertainty in Artificial Intelligence , Helsinki, Finland , July 9-12, 2008 . 220\u2013229. Noah D. Goodman, Vikash K. Mansinghka, Daniel M. Roy, Keith Bonawitz, and Joshua B. Tenenbaum. 2008. Church: a language for generative models. In UAI 2008, Proceedings of the 24th Conference in Uncertainty in Artificial Intelligence, Helsinki, Finland, July 9-12, 2008. 220\u2013229."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593900"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_2_1_45_1","volume-title":"Equality of Opportunity in Supervised Learning. CoRR abs\/1610.02413","author":"Hardt Moritz","year":"2016","unstructured":"Moritz Hardt , Eric Price , and Nathan Srebro . 2016. Equality of Opportunity in Supervised Learning. CoRR abs\/1610.02413 ( 2016 ). http:\/\/arxiv.org\/abs\/1610.02413 Moritz Hardt, Eric Price, and Nathan Srebro. 2016. Equality of Opportunity in Supervised Learning. CoRR abs\/1610.02413 (2016). http:\/\/arxiv.org\/abs\/1610.02413"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429135.2429155"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58043-7_5"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Jon Kleinberg Sendhil Mullainathan and Manish Raghavan. 2017. Inherent Trade-Offs in the Fair Determination of Risk Scores. In ITCS.  Jon Kleinberg Sendhil Mullainathan and Manish Raghavan. 2017. Inherent Trade-Offs in the Fair Determination of Risk Scores. In ITCS.","DOI":"10.1145\/3219617.3219634"},{"key":"e_1_2_1_49_1","volume-title":"Who do you blame when an algorithm gets you fired? http:\/\/www.wired.co.uk\/article\/ make- algorithms- accountable . (","author":"Kobie Nicole","year":"2016","unstructured":"Nicole Kobie . 2016. Who do you blame when an algorithm gets you fired? http:\/\/www.wired.co.uk\/article\/ make- algorithms- accountable . ( January 2016 ). ( Accessed on 06\/18\/2016). Nicole Kobie. 2016. Who do you blame when an algorithm gets you fired? http:\/\/www.wired.co.uk\/article\/ make- algorithms- accountable . ( January 2016). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_50_1","volume-title":"Probabilistic graphical models: principles and techniques","author":"Koller Daphne","unstructured":"Daphne Koller and Nir Friedman . 2009. Probabilistic graphical models: principles and techniques . MIT press . Daphne Koller and Nir Friedman. 2009. Probabilistic graphical models: principles and techniques. MIT press."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90036-2"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06410-9_28"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.15"},{"key":"e_1_2_1_54_1","volume-title":"Can an Algorithm Hire Better Than a Human? http:\/\/www.nytimes.com\/2015\/06\/26\/upshot\/ can- an- algorithm- hire- better- than- a- human.html . (June","author":"Miller Claire Cain","year":"2015","unstructured":"Claire Cain Miller . 2015. Can an Algorithm Hire Better Than a Human? http:\/\/www.nytimes.com\/2015\/06\/26\/upshot\/ can- an- algorithm- hire- better- than- a- human.html . (June 2015 ). ( Accessed on 06\/18\/2016). Claire Cain Miller. 2015. Can an Algorithm Hire Better Than a Human? http:\/\/www.nytimes.com\/2015\/06\/26\/upshot\/ can- an- algorithm- hire- better- than- a- human.html . (June 2015). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45099-3_17"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360211"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45309-1_24"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104425"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401959"},{"key":"e_1_2_1_60_1","volume-title":"Predictive policing: The role of crime forecasting in law enforcement operations","author":"Perry Walt L","unstructured":"Walt L Perry . 2013. Predictive policing: The role of crime forecasting in law enforcement operations . Rand Corporation . Walt L Perry. 2013. Predictive policing: The role of crime forecasting in law enforcement operations. Rand Corporation."},{"key":"e_1_2_1_61_1","volume-title":"A theory of justice","author":"Rawls John","unstructured":"John Rawls . 2009. A theory of justice . Harvard university press . John Rawls. 2009. A theory of justice. Harvard university press."},{"key":"e_1_2_1_62_1","first-page":"99","article-title":"Using t-closeness anonymity to control for non-discrimination","volume":"7","author":"Ruggieri Salvatore","year":"2014","unstructured":"Salvatore Ruggieri . 2014 . Using t-closeness anonymity to control for non-discrimination . Transactions on Data Privacy 7 , 2 (2014), 99 \u2013 129 . Salvatore Ruggieri. 2014. Using t-closeness anonymity to control for non-discrimination. Transactions on Data Privacy 7, 2 (2014), 99\u2013129.","journal-title":"Transactions on Data Privacy"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594294"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462179"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460276.2460278"},{"key":"e_1_2_1_66_1","volume-title":"An FDA for Algorithms. Available at SSRN 2747994","author":"Tutt Andrew","year":"2016","unstructured":"Andrew Tutt . 2016. An FDA for Algorithms. Available at SSRN 2747994 ( 2016 ). Andrew Tutt. 2016. An FDA for Algorithms. Available at SSRN 2747994 (2016)."},{"key":"e_1_2_1_67_1","volume-title":"Deals Based on Users","author":"Valentino-Devries Jennifer","year":"2045","unstructured":"Jennifer Valentino-Devries , Jeremy Singer-Vine , and Ashkan Soltani . 2012. Websites Vary Prices , Deals Based on Users \u2019 Information. http:\/\/www.wsj.com\/articles\/SB10001424127887323777 2045 78189391813881534 . (December 2012). ( Accessed on 06\/18\/2016). Jennifer Valentino-Devries, Jeremy Singer-Vine, and Ashkan Soltani. 2012. Websites Vary Prices, Deals Based on Users\u2019 Information. http:\/\/www.wsj.com\/articles\/SB10001424127887323777204578189391813881534 . (December 2012). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_68_1","volume-title":"Geometric random walks: a survey. Combinatorial and computational geometry 52, 573-612","author":"Vempala Santosh","year":"2005","unstructured":"Santosh Vempala . 2005. Geometric random walks: a survey. Combinatorial and computational geometry 52, 573-612 ( 2005 ), 2. Santosh Vempala. 2005. Geometric random walks: a survey. Combinatorial and computational geometry 52, 573-612 (2005), 2."},{"key":"e_1_2_1_69_1","volume-title":"Big Data: Seizing Opportunities, Preserving Values. https:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/ big_data_privacy_report_may_1_2014.pdf . (May","author":"WH.","year":"2014","unstructured":"WH. 2014 . Big Data: Seizing Opportunities, Preserving Values. https:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/ big_data_privacy_report_may_1_2014.pdf . (May 2014). ( Accessed on 06\/18\/2016). WH. 2014. Big Data: Seizing Opportunities, Preserving Values. https:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/ big_data_privacy_report_may_1_2014.pdf . (May 2014). (Accessed on 06\/18\/2016)."},{"key":"e_1_2_1_70_1","volume-title":"Preparing for the Future of Artificial Intelligence. https:\/\/www.whitehouse.gov\/sites\/default\/files\/whitehouse_ files\/microsites\/ostp\/NSTC\/preparing_for_the_future_of _ai.pdf . (Octorber","author":"WH.","year":"2016","unstructured":"WH. 2016. Preparing for the Future of Artificial Intelligence. https:\/\/www.whitehouse.gov\/sites\/default\/files\/whitehouse_ files\/microsites\/ostp\/NSTC\/preparing_for_the_future_of _ai.pdf . (Octorber 2016 ). ( Accessed on 10\/15\/2016). WH. 2016. Preparing for the Future of Artificial Intelligence. https:\/\/www.whitehouse.gov\/sites\/default\/files\/whitehouse_ files\/microsites\/ostp\/NSTC\/preparing_for_the_future_of _ai.pdf . (Octorber 2016). (Accessed on 10\/15\/2016)."},{"key":"e_1_2_1_71_1","article-title":"Understanding discrimination in the scored society","volume":"89","author":"Zarsky Tal","year":"2014","unstructured":"Tal Zarsky . 2014 . Understanding discrimination in the scored society . Washington Law Review 89 , 4 (2014). Tal Zarsky. 2014. Understanding discrimination in the scored society. Washington Law Review 89, 4 (2014).","journal-title":"Washington Law Review"},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the 30th International Conference on Machine Learning, ICML 2013","author":"Zemel Richard S.","year":"2013","unstructured":"Richard S. Zemel , Yu Wu , Kevin Swersky , Toniann Pitassi , and Cynthia Dwork . 2013 . Learning Fair Representations . In Proceedings of the 30th International Conference on Machine Learning, ICML 2013 , Atlanta, GA, USA , 16-21 June 2013. 325\u2013333. http:\/\/jmlr.org\/proceedings\/papers\/v28\/zemel13.html Richard S. Zemel, Yu Wu, Kevin Swersky, Toniann Pitassi, and Cynthia Dwork. 2013. Learning Fair Representations. In Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013. 325\u2013333. http:\/\/jmlr.org\/proceedings\/papers\/v28\/zemel13.html"}],"container-title":["Proceedings of the ACM on Programming Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133904","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133904","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:25Z","timestamp":1750212805000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133904"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,12]]},"references-count":72,"journal-issue":{"issue":"OOPSLA","published-print":{"date-parts":[[2017,10,12]]}},"alternative-id":["10.1145\/3133904"],"URL":"https:\/\/doi.org\/10.1145\/3133904","relation":{},"ISSN":["2475-1421"],"issn-type":[{"value":"2475-1421","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,12]]},"assertion":[{"value":"2017-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}