{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:03:34Z","timestamp":1725663814207},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540539049"},{"type":"electronic","value":"9783540463832"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-53904-2_119","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T22:15:52Z","timestamp":1330208152000},"page":"442-444","source":"Crossref","is-referenced-by-count":0,"title":["The tecton proof system"],"prefix":"10.1007","author":[{"given":"Raj","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"David R.","family":"Musser","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Kapur","sequence":"additional","affiliation":[]},{"given":"Xumin","family":"Nie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"issue":"7","key":"39_CR1","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1145\/48511.48513","volume":"31","author":"R.M. Akscyn","year":"1988","unstructured":"R.M. Akscyn, D.L. McCracken, E.A. Yoder. \u201cKMS: A Distributed Hypermedia System for Managing Knowledge in Organizations,\u201d Comm. ACM 31(7): pp. 820\u2013835 (July 1988).","journal-title":"Comm. ACM"},{"key":"39_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"5th Conference on Automated Deduction","author":"R.W. Erickson","year":"1980","unstructured":"R.W. Erickson and D.R. Musser, \u201cThe Affirm Theorem Prover: Proof Forests and Management of Large Proofs,\u201d 5th Conference on Automated Deduction, Lecture Notes in Computer Science, Vol. 87, Springer-Verlag, New York, 1980."},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"D. Kapur and H. Zhang, \u201cAn Overview of RRL (Rewrite Rule Laboratory),\u201d Proc. of Third International Conf. of Rewriting Techniques and Applications, Chapel Hill, North Carolina, April 1989.","DOI":"10.1007\/3-540-51081-8_138"}],"container-title":["Lecture Notes in Computer Science","Rewriting Techniques and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-53904-2_119.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:16:38Z","timestamp":1619572598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-53904-2_119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540539049","9783540463832"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-53904-2_119","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1991]]}}}