{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:12:15Z","timestamp":1770754335170,"version":"3.50.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030369866","type":"print"},{"value":"9783030369873","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-36987-3_5","type":"book-chapter","created":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:34:36Z","timestamp":1577838876000},"page":"73-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A Very Gentle Introduction to Multiparty Session Types"],"prefix":"10.1007","author":[{"given":"Nobuko","family":"Yoshida","sequence":"first","affiliation":[]},{"given":"Lorenzo","family":"Gheri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-18941-3_4","volume-title":"Formal Methods for Multicore Programming","author":"M Coppo","year":"2015","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Padovani, L., Yoshida, N.: A gentle introduction to multiparty asynchronous session types. In: Bernardo, M., Johnsen, E.B. (eds.) SFM 2015. LNCS, vol. 9104, pp. 146\u2013178. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-18941-3_4"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Deni\u00e9lou, P., Yoshida, N., Bejleri, A., Hu, R.: Parameterised multiparty session types. Log. Methods Comput. Sci. 8(4) (2012). \nhttps:\/\/doi.org\/10.2168\/LMCS-8(4:6)2012","DOI":"10.2168\/LMCS-8(4:6)2012"},{"issue":"2\/3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00236-005-0177-z","volume":"42","author":"S Gay","year":"2005","unstructured":"Gay, S., Hole, M.: Subtyping for session types in the pi calculus. Acta Informatica 42(2\/3), 191\u2013225 (2005). \nhttps:\/\/doi.org\/10.1007\/s00236-005-0177-z","journal-title":"Acta Informatica"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Gay, S., Ravera, A. (eds.): Behavioural Types: From Theory to Tools. River Publishers (2017)","DOI":"10.13052\/rp-9788793519817"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-30936-1_5","volume-title":"A List of Successes That Can Change the World","author":"SJ Gay","year":"2016","unstructured":"Gay, S.J.: Subtyping supports safe session substitution. In: Lindley, S., McBride, C., Trinder, P., Sannella, D. (eds.) A List of Successes That Can Change the World. LNCS, vol. 9600, pp. 95\u2013108. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-30936-1_5"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/3-540-49099-X_6","volume-title":"Programming Languages and Systems","author":"S Gay","year":"1999","unstructured":"Gay, S., Hole, M.: Types and subtypes for client-server interactions. In: Swierstra, S.D. (ed.) ESOP 1999. LNCS, vol. 1576, pp. 74\u201390. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-49099-X_6"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.jlamp.2018.12.002","volume":"104","author":"S Ghilezan","year":"2019","unstructured":"Ghilezan, S., Jaksic, S., Pantovic, J., Scalas, A., Yoshida, N.: Precise subtyping for synchronous multiparty sessions. J. Log. Algebr. Meth. Program. 104, 127\u2013173 (2019). \nhttps:\/\/doi.org\/10.1016\/j.jlamp.2018.12.002","journal-title":"J. Log. Algebr. Meth. Program."},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/3-540-57208-2_35","volume-title":"CONCUR\u201993","author":"K Honda","year":"1993","unstructured":"Honda, K.: Types for dyadic interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715, pp. 509\u2013523. Springer, Heidelberg (1993). \nhttps:\/\/doi.org\/10.1007\/3-540-57208-2_35"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-19056-8_4","volume-title":"Distributed Computing and Internet Technology","author":"K Honda","year":"2011","unstructured":"Honda, K., Mukhamedov, A., Brown, G., Chen, T.-C., Yoshida, N.: Scribbling interactions with a formal foundation. In: Natarajan, R., Ojo, A. (eds.) ICDCIT 2011. LNCS, vol. 6536, pp. 55\u201375. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-19056-8_4"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998). \nhttps:\/\/doi.org\/10.1007\/BFb0053567"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: POPL, pp. 273\u2013284. ACM Press (2008). \nhttps:\/\/doi.org\/10.1145\/1328438.1328472","DOI":"10.1145\/1328438.1328472"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2827695","volume":"63","author":"K Honda","year":"2016","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. J. ACM 63, 1\u201367 (2016)","journal-title":"J. ACM"},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2873052","volume":"49","author":"Hans H\u00fcttel","year":"2016","unstructured":"H\u00fcttel, H., et al.: Foundations of session types and behavioural contracts. ACM Comput. Surv. 49(1) (2016). \nhttps:\/\/doi.org\/10.1145\/2873052","journal-title":"ACM Computing Surveys"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-642-40184-8_28","volume-title":"CONCUR 2013 \u2013 Concurrency Theory","author":"D Kouzapas","year":"2013","unstructured":"Kouzapas, D., Yoshida, N.: Globally governed session semantics. In: D\u2019Argenio, P.R., Melgratti, H. (eds.) CONCUR 2013. LNCS, vol. 8052, pp. 395\u2013409. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40184-8_28"},{"key":"5_CR15","unstructured":"Pierce, B.C.: Types and Programming Languages. MIT Press (2002)"},{"key":"5_CR16","doi-asserted-by":"publisher","DOI":"10.1145\/3290343","author":"A Scalas","year":"2019","unstructured":"Scalas, A., Yoshida, N.: Less is more: multiparty session types revisited. ACM Program. Lang. POPL (2019). \nhttps:\/\/doi.org\/10.1145\/3290343","journal-title":"ACM Program. Lang. POPL"},{"key":"5_CR17","unstructured":"Scribble home page. \nhttp:\/\/www.scribble.org"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-58184-7_118","volume-title":"PARLE\u201994 Parallel Architectures and Languages Europe","author":"K Takeuchi","year":"1994","unstructured":"Takeuchi, K., Honda, K., Kubo, M.: An interaction-based language and its typing system. In: Halatsis, C., Maritsas, D., Philokyprou, G., Theodoridis, S. (eds.) PARLE 1994. LNCS, vol. 817, pp. 398\u2013413. Springer, Heidelberg (1994). \nhttps:\/\/doi.org\/10.1007\/3-540-58184-7_118"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-642-12032-9_10","volume-title":"Foundations of Software Science and Computational Structures","author":"N Yoshida","year":"2010","unstructured":"Yoshida, N., Deni\u00e9lou, P.-M., Bejleri, A., Hu, R.: Parameterised multiparty session types. In: Ong, L. (ed.) FoSSaCS 2010. LNCS, vol. 6014, pp. 128\u2013145. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-12032-9_10"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-05119-2_3","volume-title":"Trustworthy Global Computing","author":"N Yoshida","year":"2014","unstructured":"Yoshida, N., Hu, R., Neykova, R., Ng, N.: The scribble protocol language. In: Abadi, M., Lluch Lafuente, A. (eds.) TGC 2013. LNCS, vol. 8358, pp. 22\u201341. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-05119-2_3"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36987-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:34:51Z","timestamp":1577838891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36987-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"ISBN":["9783030369866","9783030369873"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36987-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"9 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDCIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Distributed Computing and Internet Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneswar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdcit0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icdcit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"110","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, there are 6 invited papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}