{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:54Z","timestamp":1725490614738},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540001645"},{"type":"electronic","value":"9783540361596"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36159-6_10","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T10:06:48Z","timestamp":1188295608000},"page":"109-121","source":"Crossref","is-referenced-by-count":4,"title":["Reducing the Memory Complexity of Type-Inference Algorithms"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"Alexei","family":"Tchoulkine","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Trichina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,16]]},"reference":[{"key":"10_CR1","unstructured":"A. Aho, R. Sethi, J. Ullman, Compilers: Principles, Techniques, and Tools, Addison-Wesley, 1986."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"P. Cousot, R. Cousot, Abstract Interpretation: a Unified Lattice Model for Static Analysis by Construction or Approximation of Fixpoints, Proceedings of POPL\u201977, ACM Press, Los Angeles, California, pp. 238\u2013252.","DOI":"10.1145\/512950.512973"},{"key":"10_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/3-540-44585-4_26","volume-title":"Computer Aided Verification, CAV 2001","author":"X. Leroy","year":"2001","unstructured":"X. Leroy, Java Byte-Code Verification: an Overview, In G. Berry, H. Comon, and A. Finkel, editors, Computer Aided Verification, CAV 2001, volume 2102 of Lecture Notes in Computer Science, pp. 265\u2013285, Springer-Verlag, 2001."},{"key":"10_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-45418-7_13","volume-title":"Smart Card Programming and Security, proceedings E-Smart 2001","author":"X. Leroy","year":"2001","unstructured":"X. Leroy, On-Card Byte-code Verification for Java card, In I. Attali and T. Jensen, editors, Smart Card Programming and Security, proceedings E-Smart 2001, volume 2140 of Lecture Notes in Computer Science, pp. 150\u2013164, Springer-Verlag, 2001."},{"key":"10_CR5","first-page":"319","volume":"32","author":"X. Leroy","year":"2002","unstructured":"X. Leroy, Bytecode Verification for Java smart card, Software Practice & Experience, 32:319\u2013340, 2002.","journal-title":"Bytecode Verification for Java smart card"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"T. Lindholm, F. Yellin, The Java Virtual Machine Specification, The Java Series, Addison-Wesley, 1999.","DOI":"10.1007\/978-3-642-95851-9_5"},{"key":"10_CR7","unstructured":"S. Muchnick, Advanced Compiler Design and Implementation, Morgan Kaufmann, 1997."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"G. Necula, Proof-carrying code, Proceedings of POPL\u201997, pp. 106\u2013119, ACM Press, 1997.","DOI":"10.1145\/263699.263712"},{"key":"10_CR9","volume-title":"Denotational Semantics, a Methodology for Language Development","author":"D. Schmidt","year":"1986","unstructured":"D. Schmidt, Denotational Semantics, a Methodology for Language Development, Allyn and Bacon, Boston, 1986."},{"key":"10_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45165-X_3","volume-title":"Java on Smart Cards: Programming and Security","author":"P. Bieber","year":"2001","unstructured":"P. Bieber, J. Cazin, A. El-Marouani, P. Girard, J.-L. Lanet, V. Wiels, G. Zanon, The PACAP prototype: a tool for detecting java card illegal flows, In I. Attali and T. Jensen, editors, Java on Smart Cards: Programming and Security, vol. 2041 of Lecture Notes in Computer Science, pp. 25\u201337, Springer-Verlag, 2001."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36159-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T13:06:47Z","timestamp":1556802407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36159-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001645","9783540361596"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-36159-6_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}