Skip to main content

Showing 1–37 of 37 results for author: McIver, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19642  [pdf, other

    cs.CL cs.CR cs.LG

    IDT: Dual-Task Adversarial Attacks for Privacy Protection

    Authors: Pedro Faustini, Shakila Mahjabin Tonni, Annabelle McIver, Qiongkai Xu, Mark Dras

    Abstract: Natural language processing (NLP) models may leak private information in different ways, including membership inference, reconstruction or attribute inference attacks. Sensitive information may not be explicit in the text, but hidden in underlying writing characteristics. Methods to protect privacy can involve using representations inside models that are demonstrated not to detect sensitive attrib… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: 28 pages, 1 figure

  2. arXiv:2406.15309  [pdf, other

    cs.CR

    The Privacy-Utility Trade-off in the Topics API

    Authors: Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Gabriel H. Nunes

    Abstract: The ongoing deprecation of third-party cookies by web browser vendors has sparked the proposal of alternative methods to support more privacy-preserving personalized advertising on web browsers and applications. The Topics API is being proposed by Google to provide third-parties with "coarse-grained advertising topics that the page visitor might currently be interested in". In this paper, we analy… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: CCS '24 (to appear)

  3. arXiv:2406.13569  [pdf, other

    cs.LG cs.AI cs.CR cs.IT

    Bayes' capacity as a measure for reconstruction attacks in federated learning

    Authors: Sayan Biswas, Mark Dras, Pedro Faustini, Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Parastoo Sadeghi

    Abstract: Within the machine learning community, reconstruction attacks are a principal attack of concern and have been identified even in federated learning, which was designed with privacy preservation in mind. In federated learning, it has been shown that an adversary with knowledge of the machine learning architecture is able to infer the exact value of a training element given an observation of the wei… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  4. arXiv:2405.13416  [pdf, ps, other

    cs.LO

    Source-level reasoning for quantitative information flow

    Authors: Chris Chen, Annabelle McIver, Carroll Morgan

    Abstract: We present a novel formal system for proving quantitative-leakage properties of programs. Based on a theory of Quantitative Information Flow (QIF) that models information leakage as a noisy communication channel, it uses "gain-functions" for the description and measurement of expected leaks. We use a small imperative programming language, augmented with leakage features, and with it express adve… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  5. arXiv:2309.14746  [pdf, other

    cs.CR cs.IT

    A Quantitative Information Flow Analysis of the Topics API

    Authors: Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Gabriel H. Nunes

    Abstract: Third-party cookies have been a privacy concern since cookies were first developed in the mid 1990s, but more strict cookie policies were only introduced by Internet browser vendors in the early 2010s. More recently, due to regulatory changes, browser vendors have started to completely block third-party cookies, with both Firefox and Safari already compliant. The Topics API is being proposed by… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: WPES '23 (to appear)

  6. arXiv:2308.11110  [pdf, other

    cs.CR

    A novel analysis of utility in privacy pipelines, using Kronecker products and quantitative information flow

    Authors: Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel H. Nunes

    Abstract: We combine Kronecker products, and quantitative information flow, to give a novel formal analysis for the fine-grained verification of utility in complex privacy pipelines. The combination explains a surprising anomaly in the behaviour of utility of privacy-preserving pipelines -- that sometimes a reduction in privacy results also in a decrease in utility. We use the standard measure of utility fo… ▽ More

    Submitted 7 November, 2023; v1 submitted 21 August, 2023; originally announced August 2023.

  7. arXiv:2211.04686  [pdf, other

    cs.LG cs.CR

    Directional Privacy for Deep Learning

    Authors: Pedro Faustini, Natasha Fernandes, Shakila Tonni, Annabelle McIver, Mark Dras

    Abstract: Differentially Private Stochastic Gradient Descent (DP-SGD) is a key method for applying privacy in the training of deep learning models. It applies isotropic Gaussian noise to gradients during training, which can perturb these gradients in any direction, damaging utility. Metric DP, however, can provide alternative mechanisms based on arbitrary metrics that might be more suitable for preserving u… ▽ More

    Submitted 26 November, 2023; v1 submitted 9 November, 2022; originally announced November 2022.

  8. arXiv:2210.12916  [pdf, ps, other

    cs.IT cs.CR

    Explaining epsilon in local differential privacy through the lens of quantitative information flow

    Authors: Natasha Fernandes, Annabelle McIver, Parastoo Sadeghi

    Abstract: The study of leakage measures for privacy has been a subject of intensive research and is an important aspect of understanding how privacy leaks occur in computer systems. Differential privacy has been a focal point in the privacy community for some years and yet its leakage characteristics are not completely understood. In this paper we bring together two areas of research -- information theory a… ▽ More

    Submitted 18 May, 2023; v1 submitted 23 October, 2022; originally announced October 2022.

  9. arXiv:2205.01258  [pdf, other

    cs.CR

    Universal Optimality and Robust Utility Bounds for Metric Differential Privacy

    Authors: Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding

    Abstract: We study the privacy-utility trade-off in the context of metric differential privacy. Ghosh et al. introduced the idea of universal optimality to characterise the best mechanism for a certain query that simultaneously satisfies (a fixed) $ε$-differential privacy constraint whilst at the same time providing better utility compared to any other $ε$-differentially private mechanism for the same query… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  10. Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata

    Authors: Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel H. Nunes

    Abstract: We present a systematic refactoring of the conventional treatment of privacy analyses, basing it on mathematical concepts from the framework of Quantitative Information Flow (QIF). The approach we suggest brings three principal advantages: it is flexible, allowing for precise quantification and comparison of privacy risks for attacks both known and novel; it can be computationally tractable for ve… ▽ More

    Submitted 25 July, 2022; v1 submitted 28 April, 2022; originally announced April 2022.

    Journal ref: PoPETs 2022.4 (2022) 378-399

  11. arXiv:2105.07176  [pdf, other

    cs.CR

    The Laplace Mechanism has optimal utility for differential privacy over continuous queries

    Authors: Natasha Fernandes, Annabelle McIver, Carroll Morgan

    Abstract: Differential Privacy protects individuals' data when statistical queries are published from aggregated databases: applying "obfuscating" mechanisms to the query results makes the released information less specific but, unavoidably, also decreases its utility. Yet it has been shown that for discrete data (e.g. counting queries), a mandated degree of privacy and a reasonable interpretation of loss o… ▽ More

    Submitted 26 July, 2021; v1 submitted 15 May, 2021; originally announced May 2021.

  12. arXiv:2007.15246  [pdf, other

    cs.LO

    Correctness by construction for probabilistic programs

    Authors: Annabelle McIver, Carroll Morgan

    Abstract: The "correct by construction" paradigm is an important component of modern Formal Methods, and here we use the probabilistic Guarded-Command Language $\mathit{pGCL}$ to illustrate its application to $\mathit{probabilistic}$ programming. $\mathit{pGCL}$ extends Dijkstra's guarded-command language $\mathit{GCL}$ with probabilistic choice, and is equipped with a correctness-preserving refinement rela… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    ACM Class: F.3.1; F.3.2; F.4.1; G.3

  13. arXiv:2007.10841  [pdf, other

    cs.SE

    Reasoning with failures

    Authors: Hamid Jahanian, Annabelle McIver

    Abstract: Safety Instrumented Systems (SIS) protect major hazard facilities, e.g. power plants, against catastrophic accidents. An SIS consists of hardware components and a controller software -- the ``program''. Current safety analyses of SIS' include the construction of a fault tree, summarising potential faults of the components and how they can arise within an SIS. The exercise of identifying faults typ… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

  14. arXiv:2005.06279  [pdf, other

    cs.SE

    Failure Mode Reasoning in Model Based Safety Analysis

    Authors: Hamid Jahanian, David Parker, Marc Zeller, Annabelle McIver, Yiannis Papadopoulos

    Abstract: Failure Mode Reasoning (FMR) is a novel approach for analyzing failure in a Safety Instrumented System (SIS). The method uses an automatic analysis of an SIS program to calculate potential failures in parts of the SIS. In this paper we use a case study from the power industry to demonstrate how FMR can be utilized in conjunction with other model-based safety analysis methods, such as HiP-HOPS and… ▽ More

    Submitted 19 July, 2020; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: 15 pages, 5 figures, submitted to IMBSA 2020

  15. arXiv:1811.10256  [pdf, other

    cs.CR cs.LG

    Generalised Differential Privacy for Text Document Processing

    Authors: Natasha Fernandes, Mark Dras, Annabelle McIver

    Abstract: We address the problem of how to "obfuscate" texts by removing stylistic clues which can identify authorship, whilst preserving (as much as possible) the content of the text. In this paper we combine ideas from "generalised differential privacy" and machine learning techniques for text processing to model privacy for text documents. We define a privacy mechanism that operates at the level of text… ▽ More

    Submitted 5 February, 2019; v1 submitted 26 November, 2018; originally announced November 2018.

    Comments: Typos corrected

  16. arXiv:1805.08866  [pdf, ps, other

    cs.CR

    Author Obfuscation Using Generalised Differential Privacy

    Authors: Natasha Fernandes, Mark Dras, Annabelle McIver

    Abstract: The problem of obfuscating the authorship of a text document has received little attention in the literature to date. Current approaches are ad-hoc and rely on assumptions about an adversary's auxiliary knowledge which makes it difficult to reason about the privacy properties of these methods. Differential privacy is a well-known and robust privacy approach, but its reliance on the notion of adjac… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

  17. arXiv:1801.08090  [pdf, other

    cs.CR

    An Algebraic Approach for Reasoning About Information Flow

    Authors: Arthur Américo, Mário S. Alvim, Annabelle McIver

    Abstract: This paper concerns the analysis of information leaks in security systems. We address the problem of specifying and analyzing large systems in the (standard) channel model used in quantitative information flow (QIF). We propose several operators which match typical interactions between system components. We explore their algebraic properties with respect to the security-preserving refinement relat… ▽ More

    Submitted 8 July, 2018; v1 submitted 24 January, 2018; originally announced January 2018.

  18. arXiv:1711.03588  [pdf, other

    cs.PL cs.LO

    A New Proof Rule for Almost-Sure Termination

    Authors: Annabelle McIver, Carroll Morgan, Benjamin Lucien Kaminski, Joost-Pieter Katoen

    Abstract: An important question for a probabilistic program is whether the probability mass of all its diverging runs is zero, that is that it terminates "almost surely". Proving that can be hard, and this paper presents a new method for doing so; it is expressed in a program logic, and so applies directly to source code. The programs may contain both probabilistic- and demonic choice, and the probabilistic… ▽ More

    Submitted 25 December, 2017; v1 submitted 9 November, 2017; originally announced November 2017.

    Comments: V1 to appear in PoPL18. This version collects some existing text into new example subsection 5.5 and adds a new example 5.6 and makes further remarks about uncountable branching. The new example 5.6 relates to work on lexicographic termination methods, also to appear in PoPL18 [Agrawal et al, 2018]

  19. Abstract Hidden Markov Models: a monadic account of quantitative information flow

    Authors: Annabelle McIver, Carroll Morgan, Tahiry Rabehaja

    Abstract: Hidden Markov Models, HMM's, are mathematical models of Markov processes with state that is hidden, but from which information can leak. They are typically represented as 3-way joint-probability distributions. We use HMM's as denotations of probabilistic hidden-state sequential programs: for that, we recast them as `abstract' HMM's, computations in the Giry monad $\mathbb{D}$, and we equip them… ▽ More

    Submitted 28 March, 2019; v1 submitted 4 August, 2017; originally announced August 2017.

    Journal ref: Logical Methods in Computer Science, Volume 15, Issue 1 (March 29, 2019) lmcs:3851

  20. arXiv:1612.01091  [pdf, other

    cs.LO

    A new rule for almost-certain termination of probabilistic- and demonic programs

    Authors: Annabelle McIver, Carroll Morgan

    Abstract: Extending our own and others' earlier approaches to reasoning about termination of probabilistic programs, we propose and prove a new rule for termination with probability one, also known as "almost-certain termination". The rule uses both (non-strict) super martingales and guarantees of progress, together, and it seems to cover significant cases that earlier methods do not. In particular, it suff… ▽ More

    Submitted 6 January, 2017; v1 submitted 4 December, 2016; originally announced December 2016.

    Comments: Revises earlier version by correcting typographical errors and adding an extra Section 9 on historical background. The results are unchanged

  21. arXiv:1604.04983  [pdf, other

    cs.CR cs.LO cs.PL

    Compositional security and collateral leakage

    Authors: N. Bordenabe, A. McIver, C Morgan, T. Rabehaja

    Abstract: In quantitative information flow we say that program $Q$ is "at least as secure as" $P$ just when the amount of secret information flowing from $Q$ is never more than flows from $P$, with of course a suitable quantification of "flow". This secure-refinement order $\sqsubseteq$ is compositional just when $P{\sqsubseteq}Q$ implies ${\cal C}(P){\sqsubseteq}{\cal C}(Q)$ for any context ${\cal C}$, aga… ▽ More

    Submitted 18 April, 2016; originally announced April 2016.

  22. A Rigorous Analysis of AODV and its Variants

    Authors: Peter Höfner, Rob van Glabbeek, Wee Lum Tan, Marius Portmann, Annabelle McIver, Ansgar Fehnker

    Abstract: In this paper we present a rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) routing protocol using a formal specification in AWN (Algebra for Wireless Networks), a process algebra which has been specifically tailored for the modelling of Mobile Ad Hoc Networks and Wireless Mesh Network protocols. Our formalisation models the exact details of the core functionality of AODV, such as… ▽ More

    Submitted 30 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1312.7645

    ACM Class: C.2.2; F.3.1; F.3.2

    Journal ref: Proc. Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM'12, ACM, 2012, pp. 203-212

  23. Automated Analysis of AODV using UPPAAL

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: This paper describes an automated, formal and rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) routing protocol, a popular protocol used in wireless mesh networks. We give a brief overview of a model of AODV implemented in the UPPAAL model checker. It is derived from a process-algebraic model which reflects precisely the intention of AODV and accurately captures the protocol spec… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: text overlap with arXiv:1512.07312

    ACM Class: C.2.2; D.2.4

    Journal ref: Proc. Tools and Algorithms for the Construction and Analysis of Systems, TACAS'12 (C. Flanagan & B. König, eds.), LNCS 7214, Springer, 2012, pp. 173-187

  24. A Process Algebra for Wireless Mesh Networks

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: We propose a process algebra for wireless mesh networks that combines novel treatments of local broadcast, conditional unicast and data structures. In this framework, we model the Ad-hoc On-Demand Distance Vector (AODV) routing protocol and (dis)prove crucial properties such as loop freedom and packet delivery.

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1312.7645

    ACM Class: F.3.2; F.3.1; C.2.2

    Journal ref: Proc. 21st European Symposium on Programming, ESOP'12, (Helmut Seidl, ed.), LNCS 7211, Springer, 2012, pp. 295-315

  25. arXiv:1512.07312  [pdf, ps, other

    cs.NI cs.LO

    Modelling and Analysis of AODV in UPPAAL

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: This paper describes work in progress towards an automated formal and rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) routing protocol, a popular protocol used in ad hoc wireless networks. We give a brief overview of a model of AODV implemented in the UPPAAL model checker, and describe experiments carried out to explore AODV's behaviour in two network topologies. We were able to l… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: in Proc. 1st International Workshop on Rigorous Protocol Engineering, WRiPE 2011

    ACM Class: C.2.2; D.2.4

  26. arXiv:1504.00198  [pdf, ps, other

    cs.PL

    Conditioning in Probabilistic Programming

    Authors: Friedrich Gretz, Nils Jansen, Benjamin Lucien Kaminski, Joost-Pieter Katoen, Annabelle McIver, Federico Olmedo

    Abstract: We investigate the semantic intricacies of conditioning, a main feature in probabilistic programming. We provide a weakest (liberal) pre-condition (w(l)p) semantics for the elementary probabilistic programming language pGCL extended with conditioning. We prove that quantitative weakest (liberal) pre-conditions coincide with conditional (liberal) expected rewards in Markov chains and show that sema… ▽ More

    Submitted 1 April, 2015; originally announced April 2015.

  27. arXiv:1409.0582  [pdf, other

    cs.LO

    Probabilistic Rely-guarantee Calculus

    Authors: Annabelle McIver, Tahiry Rabehaja, Georg Struth

    Abstract: Jones' rely-guarantee calculus for shared variable concurrency is extended to include probabilistic behaviours. We use an algebraic approach which combines and adapts probabilistic Kleene algebras with concurrent Kleene algebra. Soundness of the algebra is shown relative to a general probabilistic event structure semantics. The main contribution of this paper is a collection of rely-guarantee rule… ▽ More

    Submitted 2 June, 2015; v1 submitted 1 September, 2014; originally announced September 2014.

    Comments: Preprint submitted to TCS-QAPL

  28. arXiv:1312.7645  [pdf, ps, other

    cs.NI cs.LO

    A Process Algebra for Wireless Mesh Networks used for Modelling, Verifying and Analysing AODV

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: We propose AWN (Algebra for Wireless Networks), a process algebra tailored to the modelling of Mobile Ad hoc Network (MANET) and Wireless Mesh Network (WMN) protocols. It combines novel treatments of local broadcast, conditional unicast and data structures. In this framework we present a rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) protocol, a popular routing protocol designe… ▽ More

    Submitted 30 December, 2013; originally announced December 2013.

    Report number: Technical Report 5513, NICTA, 2013 ACM Class: C.2.2; F.3.1; F.3.2

  29. arXiv:1310.2320  [pdf, ps, other

    cs.LO

    An Event Structure Model for Probabilistic Concurrent Kleene Algebra

    Authors: Annabelle McIver, Tahiry Rabehaja, Georg Struth

    Abstract: We give a new true-concurrent model for probabilistic concurrent Kleene algebra. The model is based on probabilistic event structures, which combines ideas from Katoen's work on probabilistic concurrency and Varacca's probabilistic prime event structures. The event structures are compared with a true-concurrent version of Segala's probabilistic simulation. Finally, the algebraic properties of the… ▽ More

    Submitted 8 October, 2013; originally announced October 2013.

    Comments: Submitted and accepted for LPAR19 (2013)

  30. Probabilistic Concurrent Kleene Algebra

    Authors: Annabelle McIver, Tahiry Rabehaja, Georg Struth

    Abstract: We provide an extension of concurrent Kleene algebras to account for probabilistic properties. The algebra yields a unified framework containing nondeterminism, concurrency and probability and is sound with respect to the set of probabilistic automata modulo probabilistic simulation. We use the resulting algebra to generalise the algebraic formulation of a variant of Jones' rely/guarantee calculus… ▽ More

    Submitted 11 June, 2013; originally announced June 2013.

    Comments: In Proceedings QAPL 2013, arXiv:1306.2413

    Journal ref: EPTCS 117, 2013, pp. 97-115

  31. arXiv:1301.7153  [pdf, ps, other

    cs.FL

    Weak Concurrent Kleene Algebra with Application to Algebraic Verification

    Authors: Annabelle McIver, Tahiry Rabehaja, Georg Struth

    Abstract: We propose a generalisation of concurrent Kleene algebra \cite{Hoa09} that can take account of probabilistic effects in the presence of concurrency. The algebra is proved sound with respect to a model of automata modulo a variant of rooted $η$-simulation equivalence. Applicability is demonstrated by algebraic treatments of two examples: algebraic may testing and Rabin's solution to the choice coor… ▽ More

    Submitted 30 January, 2013; originally announced January 2013.

    Comments: 17 pages

    MSC Class: 68Q70

  32. Model exploration and analysis for quantitative safety refinement in probabilistic B

    Authors: Ukachukwu Ndukwu, Annabelle McIver

    Abstract: The role played by counterexamples in standard system analysis is well known; but less common is a notion of counterexample in probabilistic systems refinement. In this paper we extend previous work using counterexamples to inductive invariant properties of probabilistic systems, demonstrating how they can be used to extend the technique of bounded model checking-style analysis for the refinement… ▽ More

    Submitted 21 June, 2011; originally announced June 2011.

    Comments: In Proceedings Refine 2011, arXiv:1106.3488

    Journal ref: EPTCS 55, 2011, pp. 101-120

  33. Hidden-Markov Program Algebra with iteration

    Authors: Annabelle McIver, Larissa Meinicke, Carroll Morgan

    Abstract: We use Hidden Markov Models to motivate a quantitative compositional semantics for noninterference-based security with iteration, including a refinement- or "implements" relation that compares two programs with respect to their information leakage; and we propose a program algebra for source-level reasoning about such programs, in particular as a means of establishing that an "implementation" prog… ▽ More

    Submitted 1 February, 2011; originally announced February 2011.

    Journal ref: Math. Struct. Comp. Sci. 25 (2015) 320-360

  34. arXiv:1007.1054  [pdf, other

    cs.FL

    Compositional closure for Bayes Risk in probabilistic noninterference

    Authors: Annabelle McIver, Larissa Meinicke, Carroll Morgan

    Abstract: We give a sequential model for noninterference security including probability (but not demonic choice), thus supporting reasoning about the likelihood that high-security values might be revealed by observations of low-security activity. Our novel methodological contribution is the definition of a refinement order and its use to compare security measures between specifications and (their supposed)… ▽ More

    Submitted 7 July, 2010; originally announced July 2010.

    ACM Class: F.3.1; F.3.2

  35. An expectation transformer approach to predicate abstraction and data independence for probabilistic programs

    Authors: Ukachukwu Ndukwu, Annabelle McIver

    Abstract: In this paper we revisit the well-known technique of predicate abstraction to characterise performance attributes of system models incorporating probability. We recast the theory using expectation transformers, and identify transformer properties which correspond to abstractions that yield nevertheless exact bound on the performance of infinite state probabilistic systems. In addition, we extend t… ▽ More

    Submitted 25 June, 2010; originally announced June 2010.

    Journal ref: EPTCS 28, 2010, pp. 129-143

  36. arXiv:0912.2128   

    cs.LO cs.PF

    Proceedings First Workshop on Quantitative Formal Methods: Theory and Applications

    Authors: Suzana Andova, Annabelle McIver, Pedro D'Argenio, Pieter Cuijpers, Jasen Markovski, Caroll Morgan, Manuel Núñez

    Abstract: This volume contains the papers presented at the 1st workshop on Quantitative Formal Methods: Theory and Applications, which was held in Eindhoven on 3 November 2009 as part of the International Symposium on Formal Methods 2009. This volume contains the final versions of all contributions accepted for presentation at the workshop.

    Submitted 10 December, 2009; originally announced December 2009.

    ACM Class: D.2.1; D.2.4; D.3.1; F.3.1

    Journal ref: EPTCS 13, 2009

  37. arXiv:cs/0309024  [pdf, ps, other

    cs.LO cs.GT

    Results on the quantitative mu-calculus qMu

    Authors: Annabelle McIver, Carroll Morgan

    Abstract: The mu-calculus is a powerful tool for specifying and verifying transition systems, including those with both demonic and angelic choice; its quantitative generalisation qMu extends that to probabilistic choice. We show that for a finite-state system the logical interpretation of qMu, via fixed-points in a domain of real-valued functions into [0,1], is equivalent to an operational interpretati… ▽ More

    Submitted 14 September, 2003; originally announced September 2003.

    Comments: 45 pages, 4 figures

    ACM Class: D.2.4; F.1.2; F.3.1; F.4.1; G.3