References: [1] Ammann, P., Offutt, J. (2008). Introduction to Software Testing. Cambridge University Press. [2] Bernardy, J.-P., Jansson, P., Claessen, K. (2010). Testing polymorphic properties. In A. Gordon (Ed.), European Symposium on Programming (Vol. 6012, pp. 125–144). Springer. [3] Bishop, E., Bridges, D. (1985). Constructive Analysis. Springer, New York. [4] Boldo, S., Melquiond, G. (2011). Flocq: A unified library for proving floating-point algorithms in Coq. In Proceedings of the 20th IEEE Symposium on Computer Arithmetic (pp. 243–252). IEEE CS Press. [5] Brady, E. C. (2011). Idris — systems programming meets full dependent types. In Proc. 5th ACM workshop on Programming languages meets program verification, PLPV ’11 (pp. 43–54). ACM. [6] Cannon, T., Twigg, J., Rowell, J. (2002). Social vulnerability, sustainable livelihoods and disasters (Technical Report). AON Benfield UCL Hazard Research Center. Retrieved from http:/ /www.abuhrc.org/Documents/Social vulnerability_sust_live.pdf [7] Chakraborty, J., Tobin, G. A.., Montz, B. E. (2005). Population evacuation: Assessing spatial variability in geophysical risk and social vulnerability to natural hazards. Natural Hazards Review, 22–33. [8] Claessen, K., Hughes, J. (2003). Specification based testing with QuickCheck. In The Fun of Programming (pp. 17–40). Palgrave. [9] Feldbrügge, T., von Braun, J. (2002). Is the world becoming a more risky place? Trends in disasters and vulnerability to them (Technical Report No. 46). Center for Development Research, Bonn. [10] Harrison, J. (1997). Floating point verification in HOL Light: The exponential function (Technical Report No. 428). University of Cambridge Computer Laboratory. Retrieved from http:// www.cl.cam.ac.uk/~jrh13/papers/tang.html [11] Ionescu, C. (2009). Vulnerability Modeling and Monadic Dynamical Systems (PhD thesis). Department of Mathematics and Informatics, Free University Berlin. [12] Krebbers, R., Spitters, B. (2011). Computer certified efficient exact reals in Coq. In J. H. Davenport et al. (Eds.), Calculemus/MKM (Vol. 6824, pp. 90–106). Springer. [13] Lemmen, D., Warren, F. (Eds.). (2004). Climate Change Impacts and Adaptation: A Canadian Perspective. Natural Resources Canada. [14] Lincke, D., Jansson, P., Zalewski, M.., Ionescu, C. (2009). Generic libraries in C++ with concepts from high-level domain descriptions in Haskell: A DSL for computational vulnerability assessment. In W. Taha (Ed.), IFIP Working Conf. on Domain Specific Languages (Vol. 5658, pp. 236–261). Springer. [15] Lindblad, F.., Benke, M. (2006). A tool for automated theorem proving in Agda. In J.-C. Filliâtre et al. (Eds.), Types for Proofs and Programs, International Workshop, TYPES 2004 (pp. 154–169). Springer. [16] McCarthy, J. J., Canziani, O., Leary, N. A., Dokken, D. J.., White, K. S. (Eds.). (2001). Climate Change 2001: Impacts, Adaptation and Vulnerability. Cambridge University Press. [17] Metzger, M. J.., Schröter, D. (2006). Towards a spatially explicit and quantitative vulnerability assessment of environmental change in Europe. Regional Environmental Change, 6(4), 201– 216. [18] Miner, P. S. (1995). Defining the IEEE-854 floating-point standard in PVS (Technical Memorandum No. 110167). NASA, Langley Research. Retrieved from http:// nasa1995.tpub.com/NASA-95-tm110167/ [19] Morgenstern, J.., Licata, D. R. (2010). Security-typed programming within dependently typed programming. In: Proceedings 15th ACM SIGPLAN international conference on Functional programming, ICFP ’10 (pp. 169–180). ACM. [20] Myers, G. J. (2004). The Art of Software Testing (2nd ed., revised and updated by T. Badgett, T. M. Thomas., C. Sandler). John Wiley & Sons, Inc. [21] Norell, U. (2007). Towards a Practical Programming Language Based on Dependent Type Theory (PhD thesis). Chalmers University of Technology. [22] O’Connor, R. (2007). A monadic, functional implementation of real numbers. Mathematical Structures in Computer Science, 1, 129–159. [23] O’Connor, R. (2008). Certified exact transcendental real number computation in Coq. In O. Ait Mohamed et al. (Eds.), Theorem Proving in Higher Order Logics (Vol. 5170, pp. 246–261). Springer. [24] Oury, N.., Swierstra, W. (2008). The power of Pi. In: International Conference on Functional Programming (pp. 39–50). ACM. [25] Pascal, B. (1909–14). Minor Works, translated by O. W. Wright (Vol. XLVIII, Part 2 of The Harvard classics). P.F. Collier & Son. [26] The Agda Team. (2011). The Agda Wiki. Retrieved from http://wiki.portal.chalmers.se/ agda/pmwiki.php. Includes documentation, links to the Agda implementation and to the standard library. [27] Thywissen, K. (2006). Components of risk, a comparative glossary. SOURCE - Studies Of the University: Research, Counsel, Education, 2. [28] UN/ISDR (United Nations International Strategy for Disaster Reduction). (2004). Living with Risk. A Global Review of Disaster Reduction Initiatives. United Nations, Geneva. |