{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T11:14:40Z","timestamp":1697886880392},"reference-count":27,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":8217,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1984,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper presents a static approach to exception handling. The static approach is proposed as a consequence of an examination of existing language constructs for exception handling in which several trouble spots have been revealed. The static approach consists basically of one concept, namely the sequel concept. Although the sequel concept is sufficient to specify exception handling within a program, one additional concept is introduced, namely the derived definition concept that is introduced as a generalization of the derived type and generic concepts from Ada.<\/jats:p><jats:p>The main advantages of the static approach are first that it is truly static as opposed to the existing language constructs in which dynamic association is used in some way or another; and, secondly, the language constructs for exception handling are simple, easy to implement and based on familiar concepts.<\/jats:p>","DOI":"10.1002\/spe.4380140504","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T03:26:14Z","timestamp":1163820374000},"page":"429-449","source":"Crossref","is-referenced-by-count":9,"title":["Exception handling\u2014A static approach"],"prefix":"10.1002","volume":"14","author":[{"given":"J\u00f8rgen Lindskov","family":"Knudsen","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"crossref","unstructured":"J. B.Goodenough \u2018Structured exception handling\u2019 Proc. 2nd Annual ACM Symposium on Principles of Programming Languages Palo Alto California 20\u201322 January1975.","DOI":"10.1145\/512976.512997"},{"issue":"12","key":"e_1_2_1_3_2","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1145\/361227.361230","article-title":"Exception handling: issues and a proposed notion","volume":"18","author":"Goodenough J. B.","year":"1975","journal-title":"Comm. ACM"},{"issue":"6","key":"e_1_2_1_4_2","article-title":"Rationale for the design of the ADA programming language","volume":"14","author":"Ichbian J. D.","year":"1979","journal-title":"SIGPLAN Notices"},{"key":"e_1_2_1_5_2","unstructured":"Ada Joint Program Office Reference Manual for the Ada Programming Language United States Department of Defence MIL\u2010STD 1815 1982."},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.230191"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00289243"},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/0096-0551(80)90049-1"},{"key":"e_1_2_1_9_2","volume-title":"Pascal: User Manual and Report","author":"Jensen K.","year":"1975"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288686"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/363744.363749"},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365257"},{"key":"e_1_2_1_13_2","volume-title":"Proc. Programming Symposium, Paris, 9\u201311 April 1974, Lecture Notes in Computer Science","author":"Zahn C. T.","year":"1974"},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/362280.362300"},{"key":"e_1_2_1_15_2","doi-asserted-by":"crossref","unstructured":"P. Naur (ed.) \u2018Revised report on the algorithmic language ALGOL60\u2019 Comm.ACM 6 (1) 1\u201317(1963).","DOI":"10.1145\/366193.366201"},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312840"},{"key":"e_1_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229905"},{"key":"e_1_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380091109"},{"key":"e_1_2_1_20_2","doi-asserted-by":"crossref","unstructured":"B. B.Kristensen O. L.Madsen B.M\u00f8ller\u2010PetersenandK.Nygaard \u2018Abstraction mechanisms in the BETA programming language\u2019 Proc. 10th Annual ACM Symposium on Principles of Programming Languages Austin Texas 24\u201326 January1983.","DOI":"10.1145\/567067.567094"},{"key":"e_1_2_1_21_2","unstructured":"Cyber Record Manager Version 1 Reference Manual Publication no. 60495700 Control Data Corporation 1976."},{"key":"e_1_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/356635.356640"},{"key":"e_1_2_1_23_2","volume-title":"Proc. Information Processing 68, Edinburgh, 5\u201310 August 1968","author":"Noble J. M.","year":"1969"},{"key":"e_1_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/390017.808316"},{"key":"e_1_2_1_25_2","volume-title":"Proc. Operating Systems, Rocquencourt, 23\u201325 April 1974, Lecture Notes in Computer Science","author":"Horning J. J.","year":"1974"},{"key":"e_1_2_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_2_1_27_2","unstructured":"Office of Technology and Standards \u2018Introduction to the CCITT high level language\u2019 Technical Information Bulletin 80\u20131 National Communications Systems Washington 1980."},{"key":"e_1_2_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233830"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380140504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380140504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T07:51:55Z","timestamp":1697788315000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380140504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1984,5]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1984,5]]}},"alternative-id":["10.1002\/spe.4380140504"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380140504","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1984,5]]}}}