We present an exact Bayesian inference method for inferring posterior
di...
We present a new proof rule for verifying lower bounds on quantities of
...
Probabilistic programs are typically normal-looking programs describing
...
A barrier certificate often serves as an inductive invariant that isolat...
Hardware supply-chain attacks are raising significant security threats t...
A desired property of randomized systems, represented by probabilistic
p...
We study discrete probabilistic programs with potentially unbounded loop...
A barrier certificate often serves as an inductive invariant that isolat...
We revisit two well-established verification techniques, k-induction and...
Nonlinear interpolants have been shown useful for the verification of
pr...
In this paper, we investigate the termination problem of a family of
pol...