{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:13:47Z","timestamp":1775873627616,"version":"3.50.1"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319189406","type":"print"},{"value":"9783319189413","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18941-3_4","type":"book-chapter","created":{"date-parts":[[2015,5,6]],"date-time":"2015-05-06T15:14:47Z","timestamp":1430925287000},"page":"146-178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["A Gentle Introduction to Multiparty Asynchronous Session Types"],"prefix":"10.1007","author":[{"given":"Mario","family":"Coppo","sequence":"first","affiliation":[]},{"given":"Mariangiola","family":"Dezani-Ciancaglini","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Padovani","sequence":"additional","affiliation":[]},{"given":"Nobuko","family":"Yoshida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,7]]},"reference":[{"key":"4_CR1","unstructured":"Apims (2014). http:\/\/thelas.dk\/index.php?title=Apims"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Castellani, I., Deni\u00e9lou, P.-M., Dezani-Ciancaglini, M., Ghilezan, S., Pantovic, J., P\u00e9rez, J.A., Thiemann, P., Toninho, B., Vieira, H.T.: Combining behavioural types with security analysis (2014, Submitted for Journal Publication)","DOI":"10.1016\/j.jlamp.2015.09.003"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-540-85361-9_33","volume-title":"CONCUR 2008 - Concurrency Theory","author":"L Bettini","year":"2008","unstructured":"Bettini, L., Coppo, M., D\u2019Antoni, L., De Luca, M., Dezani-Ciancaglini, M., Yoshida, N.: Global progress in dynamically interleaved multiparty sessions. In: van Breugel, F., Chechik, M. (eds.) CONCUR 2008. LNCS, vol. 5201, pp. 418\u2013433. Springer, Heidelberg (2008)"},{"key":"4_CR4","first-page":"124","volume-title":"CSF 2009","author":"K Bhargavan","year":"2009","unstructured":"Bhargavan, K., Corin, R., Deni\u00e9lou, P.-M., Fournet, C., Leifer, J.J.: Cryptographic protocol synthesis and verification for multiparty sessions. In: Mitchell, J.C. (ed.) CSF 2009, pp. 124\u2013140. IEEE Computer Society Press, Los Alamitos (2009)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-38592-6_5","volume-title":"Formal Techniques for Distributed Systems","author":"L Bocchi","year":"2013","unstructured":"Bocchi, L., Chen, T.-C., Demangeon, R., Honda, K., Yoshida, N.: Monitoring networks through multiparty session types. In: Beyer, D., Boreale, M. (eds.) FORTE 2013 and FMOODS 2013. LNCS, vol. 7892, pp. 50\u201365. Springer, Heidelberg (2013)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-41157-1_7","volume-title":"Trustworthy Global Computing","author":"L Bocchi","year":"2013","unstructured":"Bocchi, L., Demangeon, R., Yoshida, N.: A multiparty multi-session logic. In: Palamidessi, C., Ryan, M.D. (eds.) TGC 2012. LNCS, vol. 8191, pp. 97\u2013111. Springer, Heidelberg (2013)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-15375-4_12","volume-title":"CONCUR 2010 - Concurrency Theory","author":"L Bocchi","year":"2010","unstructured":"Bocchi, L., Honda, K., Tuosto, E., Yoshida, N.: A theory of design-by-contract for distributed multiparty interactions. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 162\u2013176. Springer, Heidelberg (2010)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-642-54833-8_26","volume-title":"Programming Languages and Systems","author":"L Bocchi","year":"2014","unstructured":"Bocchi, L., Melgratti, H., Tuosto, E.: Resolving non-determinism in choreographies. In: Shao, Z. (ed.) ESOP 2014 (ETAPS). LNCS, vol. 8410, pp. 493\u2013512. Springer, Heidelberg (2014)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/978-3-662-44584-6_29","volume-title":"CONCUR 2014 \u2013 Concurrency Theory","author":"L Bocchi","year":"2014","unstructured":"Bocchi, L., Yang, W., Yoshida, N.: Timed multiparty session types. In: Baldan, P., Gorla, D. (eds.) CONCUR 2014. LNCS, vol. 8704, pp. 419\u2013434. Springer, Heidelberg (2014)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-78663-4_17","volume-title":"Trustworthy Global Computing","author":"E Bonelli","year":"2008","unstructured":"Bonelli, E., Compagnoni, A.B.: Multipoint session types for a distributed calculus. In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, vol. 4912, pp. 240\u2013256. Springer, Heidelberg (2008)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D Brand","year":"1983","unstructured":"Brand, D., Zafiropulo, P.: On communicating finite-state machines. J. ACM 30, 323\u2013342 (1983)","journal-title":"J. ACM"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.ic.2014.07.005","volume":"238","author":"S Capecchi","year":"2014","unstructured":"Capecchi, S., Castellani, I., Dezani-Ciancaglini, M.: Typing access control and secure information flow in sessions. Inf. Comput. 238, 68\u2013105 (2014)","journal-title":"Inf. Comput."},{"key":"4_CR13","unstructured":"Capecchi, S., Castellani, I., Dezani-Ciancaglini, M.: Information flow safety in multiparty sessions. Math. Struct. Comput. Sci. 1\u201343 (2015). http:\/\/journals.cambridge.org\/article_S0960129514000619"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-15375-4_17","volume-title":"CONCUR 2010 - Concurrency Theory","author":"S Capecchi","year":"2010","unstructured":"Capecchi, S., Castellani, I., Dezani-Ciancaglini, M., Rezk, T.: Session types for access and information flow control. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 237\u2013252. Springer, Heidelberg (2010)"},{"key":"4_CR15","unstructured":"Capecchi, S., Giachino, E., Yoshida, N.: Global escape in multiparty sessions. Math. Struct. Comput. Sci. 1\u201350 (2015). http:\/\/journals.cambridge.org\/article_S0960129514000164"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/2220365.2220367","volume":"34","author":"M Carbone","year":"2012","unstructured":"Carbone, M., Honda, K., Yoshida, N.: Structured communication-centered programming for web services. ACM Trans. Program. Lang. Syst. 34(2), 8 (2012)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR17","first-page":"263","volume-title":"POPL 2013","author":"M Carbone","year":"2013","unstructured":"Carbone, M., Montesi, F.: Deadlock-freedom-by-design: multiparty asynchronous global programming. In: Giacobazzi, R., Cousot, R. (eds.) POPL 2013, pp. 263\u2013274. ACM, New York (2013)"},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2168\/LMCS-8(1:24)2012","volume":"8","author":"G Castagna","year":"2012","unstructured":"Castagna, G., Dezani-Ciancaglini, M., Padovani, L.: On global types and multi-party session. Logical Methods Comput. Sci. 8(1), 24 (2012)","journal-title":"Logical Methods Comput. Sci."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Castellani, I., Dezani-Ciancaglini, M., P\u00e9rez, J.A.: Self-adaptation and secure information flow in multiparty structured communications: a unified perspective. In: Carbone, M. (ed.) BEAT 2014. EPTCS, vol. 162, pp. 9\u201318 (2014)","DOI":"10.4204\/EPTCS.162.2"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-30065-3_2","volume-title":"Trustworthy Global Computing","author":"T-C Chen","year":"2012","unstructured":"Chen, T.-C., Bocchi, L., Deni\u00e9lou, P.-M., Honda, K., Yoshida, N.: Asynchronous distributed monitoring for multiparty session enforcement. In: Bruni, R., Sassone, V. (eds.) TGC 2011. LNCS, vol. 7173, pp. 25\u201345. Springer, Heidelberg (2012)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-32940-1_16","volume-title":"CONCUR 2012 \u2013 Concurrency Theory","author":"T-C Chen","year":"2012","unstructured":"Chen, T.-C., Honda, K.: Specifying stateful asynchronous properties for distributed programs. In: Koutny, M., Ulidowski, I. (eds.) CONCUR 2012. LNCS, vol. 7454, pp. 209\u2013224. Springer, Heidelberg (2012)"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-38493-6_4","volume-title":"Coordination Models and Languages","author":"M Coppo","year":"2013","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Padovani, L., Yoshida, N.: Inference of global progress properties for dynamically interleaved multiparty sessions. In: De Nicola, R., Julien, C. (eds.) COORDINATION 2013. LNCS, vol. 7890, pp. 45\u201359. Springer, Heidelberg (2013)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Venneri, B.: Self-adaptive multiparty sessions. SOCA 1\u201320 (2014). http:\/\/dx.doi.org\/10.1007\/s11761-014-0171-9","DOI":"10.1109\/PDP.2014.18"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-72952-5_1","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"M Coppo","year":"2007","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Yoshida, N.: Asynchronous session types and progress for object oriented languages. In: Bonsangue, M.M., Johnsen, E.B. (eds.) FMOODS 2007. LNCS, vol. 4468, pp. 1\u201331. Springer, Heidelberg (2007)"},{"key":"4_CR25","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Yoshida, N., Padovani, L.: Global progress for dynamically interleaved multiparty sessions. Math. Struct. Comput. Sci. 1\u201365 (2015). http:\/\/journals.cambridge.org\/article_S0960129514000188"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-319-11245-9_9","volume-title":"Software Language Engineering","author":"M Dalla Preda","year":"2014","unstructured":"Dalla Preda, M., Giallorenzo, S., Lanese, I., Mauro, J., Gabbrielli, M.: AIOCJ: a choreographic framework for safe adaptive distributed applications. In: Combemale, B., Pearce, D.J., Barais, O., Vinju, J.J. (eds.) SLE 2014. LNCS, vol. 8706, pp. 161\u2013170. Springer, Heidelberg (2014)"},{"key":"4_CR27","first-page":"139","volume-title":"PPDP 2012","author":"O Dardha","year":"2012","unstructured":"Dardha, O., Giachino, E., Sangiorgi, D.: Session types revisited. In: De Schreye, D., Janssens, G., King, A. (eds.) PPDP 2012, pp. 139\u2013150. ACM Press, New york (2012)"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-32940-1_20","volume-title":"CONCUR 2012 \u2013 Concurrency Theory","author":"R Demangeon","year":"2012","unstructured":"Demangeon, R., Honda, K.: Nested protocols in session types. In: Koutny, M., Ulidowski, I. (eds.) CONCUR 2012. LNCS, vol. 7454, pp. 272\u2013286. Springer, Heidelberg (2012)"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Demangeon, R., Honda, K., Hu, R., Neykova, R., Yoshida, N.: Practical interruptible conversations: distributed dynamic verification with multiparty session types and Python. Formal Methods Syst. Des. 1\u201329 (2014). http:\/\/dx.doi.org\/10.1007\/s10703-014-0218-8","DOI":"10.1007\/s10703-014-0218-8"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-15375-4_24","volume-title":"CONCUR 2010 - Concurrency Theory","author":"P-M Deni\u00e9lou","year":"2010","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Buffered communication analysis in distributed multiparty sessions. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 343\u2013357. Springer, Heidelberg (2010)"},{"key":"4_CR31","first-page":"435","volume-title":"POPL 2011","author":"P-M Deni\u00e9lou","year":"2011","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Dynamic multirole session types. In: Ball, T., Sagiv, M. (eds.) POPL 2011, pp. 435\u2013446. ACM Press, New York (2011)"},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-28869-2_10","volume-title":"Programming Languages and Systems","author":"P-M Deni\u00e9lou","year":"2012","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Multiparty session types meet communicating automata. In: Seidl, H. (ed.) Programming Languages and Systems. LNCS, vol. 7211, pp. 194\u2013213. Springer, Heidelberg (2012)"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-642-39212-2_18","volume-title":"Automata, Languages, and Programming","author":"P-M Deni\u00e9lou","year":"2013","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Multiparty compatibility in communicating automata: characterisation and synthesis of global session types. In: Fomin, F.V., Freivalds, R., Kwiatkowska, M., Peleg, D. (eds.) ICALP 2013, Part II. LNCS, vol. 7966, pp. 174\u2013186. Springer, Heidelberg (2013)"},{"issue":"4","key":"4_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2168\/LMCS-8(4:6)2012","volume":"8","author":"P-M Deni\u00e9lou","year":"2012","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N., Bejleri, A., Hu, R.: Parameterised multiparty session types. Logical Methods Comput. Sci. 8(4), 1\u201346 (2012)","journal-title":"Logical Methods Comput. Sci."},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14458-5_1","volume-title":"Web Services and Formal Methods","author":"M Dezani-Ciancaglini","year":"2010","unstructured":"Dezani-Ciancaglini, M., de\u2019Liguoro, U.: Sessions and session types: an overview. In: Laneve, C., Su, J. (eds.) WS-FM 2009. LNCS, vol. 6194, pp. 1\u201328. Springer, Heidelberg (2010)"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/11785477_20","volume-title":"ECOOP 2006 \u2013 Object-Oriented Programming","author":"M Dezani-Ciancaglini","year":"2006","unstructured":"Dezani-Ciancaglini, M., Mostrous, D., Yoshida, N., Drossopoulou, S.: Session types for object-oriented languages. In: Thomas, D. (ed.) ECOOP 2006. LNCS, vol. 4067, pp. 328\u2013352. Springer, Heidelberg (2006)"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-662-45917-1_8","volume-title":"Trustworthy Global Computing","author":"L Fossati","year":"2014","unstructured":"Fossati, L., Hu, R., Yoshida, N.: Multiparty session nets. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 112\u2013127. Springer, Heidelberg (2014)"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-39088-3_8","volume-title":"Foundations of Health Information Engineering and Systems","author":"AS Henriksen","year":"2013","unstructured":"Henriksen, A.S., Nielsen, L., Hildebrandt, T.T., Yoshida, N., Henglein, F.: Trustworthy pervasive healthcare services via multiparty session types. In: Weber, J., Perseil, I. (eds.) FHIES 2012. LNCS, vol. 7789, pp. 124\u2013141. Springer, Heidelberg (2013)"},{"key":"4_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/3-540-57208-2_35","volume-title":"CONCUR 1993","author":"K Honda","year":"1993","unstructured":"Honda, K.: Types for dyadic interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715, pp. 509\u2013523. Springer, Heidelberg (1993)"},{"key":"4_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-662-44471-9_5","volume-title":"Concurrent Objects and Beyond","author":"K Honda","year":"2014","unstructured":"Honda, K., Hu, R., Neykova, R., Chen, T.-C., Demangeon, R., Deni\u00e9lou, P.-M., Yoshida, N.: Structuring Communication with session types. In: Agha, G., Igarashi, A., Kobayashi, N., Masuhara, H., Matsuoka, S., Shibayama, E., Taura, K. (eds.) Concurrent Objects and Beyond. LNCS, vol. 8665, pp. 105\u2013127. Springer, Heidelberg (2014)"},{"key":"4_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-19056-8_4","volume-title":"Distributed Computing and Internet Technology","author":"K Honda","year":"2011","unstructured":"Honda, K., Mukhamedov, A., Brown, G., Chen, T.-C., Yoshida, N.: Scribbling interactions with a formal foundation. In: Natarajan, R., Ojo, A. (eds.) ICDCIT 2011. LNCS, vol. 6536, pp. 55\u201375. Springer, Heidelberg (2011)"},{"key":"4_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"ESOP 1998","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type disciplines for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"key":"4_CR43","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/1328438.1328472","volume-title":"POPL\u201908","author":"K Honda","year":"2008","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: Necula, G.C., Wadler, P. (eds.) POPL\u201908, pp. 273\u2013284. ACM Press, New York (2008)"},{"key":"4_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-40787-1_8","volume-title":"Runtime Verification","author":"R Hu","year":"2013","unstructured":"Hu, R., Neykova, R., Yoshida, N., Demangeon, R., Honda, K.: Practical interruptible conversations. In: Legay, A., Bensalem, S. (eds.) RV 2013. LNCS, vol. 8174, pp. 130\u2013148. Springer, Heidelberg (2013)"},{"key":"4_CR45","unstructured":"H\u00fcttel, H., Lanese, I., Vasconcelos, V.T., Caires, L., Carbone, M., Deni\u00e9lou, P.-M., Mostrous, D., Padovani, L., Ravara, A., Tuosto, E., Vieira, H.T., Zavattaro, G.: Foundations of Behavioural Types (2014). Submitted for journal publication"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Kouzapas, D., Yoshida, N.: Globally governed session semantics. Logical Methods Comput. Sci. 10, 1\u201345 (2015)","DOI":"10.2168\/LMCS-10(4:20)2014"},{"key":"4_CR47","first-page":"1","volume":"29","author":"D Kouzapas","year":"2015","unstructured":"Kouzapas, D., Yoshida, N., Raymond, H., Honda, K.: On asynchronous eventful session semantics. Math. Struct. Comput. Sci. 29, 1\u201362 (2015)","journal-title":"Math. Struct. Comput. Sci."},{"key":"4_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-32940-1_17","volume-title":"CONCUR 2012 \u2013 Concurrency Theory","author":"J Lange","year":"2012","unstructured":"Lange, J., Tuosto, E.: Synthesising choreographies from local session types. In: Koutny, M., Ulidowski, I. (eds.) CONCUR 2012. LNCS, vol. 7454, pp. 225\u2013239. Springer, Heidelberg (2012)"},{"key":"4_CR49","first-page":"221","volume-title":"POPL 2015","author":"J Lange","year":"2015","unstructured":"Lange, J., Tuosto, E., Yoshida, N.: From communicating machines to graphical choreographies. In: Rajamani, S.K., Walker, D. (eds.) POPL 2015, pp. 221\u2013232. ACM Press, New York (2015)"},{"key":"4_CR50","volume-title":"Communicating and Mobile Systems: The $$\\pi $$-Calculus","author":"R Milner","year":"1999","unstructured":"Milner, R.: Communicating and Mobile Systems: The $$\\pi $$-Calculus. Cambridge University Press, Cambridge (1999)"},{"key":"4_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-642-40184-8_30","volume-title":"CONCUR 2013 \u2013 Concurrency Theory","author":"F Montesi","year":"2013","unstructured":"Montesi, F., Yoshida, N.: Compositional choreographies. In: D\u2019Argenio, P.R., Melgratti, H. (eds.) CONCUR 2013 \u2013 Concurrency Theory. LNCS, vol. 8052, pp. 425\u2013439. Springer, Heidelberg (2013)"},{"key":"4_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-00590-9_23","volume-title":"Programming Languages and Systems","author":"D Mostrous","year":"2009","unstructured":"Mostrous, D., Yoshida, N., Honda, K.: Global principal typing in partially commutative asynchronous sessions. In: Castagna, G. (ed.) ESOP 2009. LNCS, vol. 5502, pp. 316\u2013332. Springer, Heidelberg (2009)"},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Neykova, R., Bocchi, L., Yoshida, N.: Timed runtime monitoring for multiparty conversations. In: Carbone, M. (eds.) BEAT 2014. EPTCS, vol. 162, pp. 19\u201326 (2014)","DOI":"10.4204\/EPTCS.162.3"},{"key":"4_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-662-43376-8_9","volume-title":"Coordination Models and Languages","author":"R Neykova","year":"2014","unstructured":"Neykova, R., Yoshida, N.: Multiparty session actors. In: K\u00fchn, E., Pugliese, R. (eds.) COORDINATION 2014. LNCS, vol. 8459, pp. 131\u2013146. Springer, Heidelberg (2014)"},{"key":"4_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-40787-1_25","volume-title":"Runtime Verification","author":"R Neykova","year":"2013","unstructured":"Neykova, R., Yoshida, N., Hu, R.: SPY: local verification of global protocols. In: Legay, A., Bensalem, S. (eds.) RV 2013. LNCS, vol. 8174, pp. 358\u2013363. Springer, Heidelberg (2013)"},{"key":"4_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-662-46663-6_11","volume-title":"Compiler Construction","author":"N Ng","year":"2015","unstructured":"Ng, N., de Figueiredo Coutinho, J.G., Yoshida, N.: Protocols by default: safe MPI code generation based on session types. In: Franke, B. (ed.) CC 2015. LNCS, vol. 9031, pp. 212\u2013232. Springer, Heidelberg (2015)"},{"key":"4_CR57","doi-asserted-by":"crossref","unstructured":"Ng, N., Yoshida, N.: Pabble: parameterised Scribble. SOCA 1\u201316 (2014). http:\/\/dx.doi.org\/10.1007\/s11761-014-0172-8","DOI":"10.1007\/s11761-014-0172-8"},{"key":"4_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-642-30561-0_15","volume-title":"Objects, Models, Components, Patterns","author":"N Ng","year":"2012","unstructured":"Ng, N., Yoshida, N., Honda, K.: Multiparty session C: safe parallel programming with message optimisation. In: Furia, C.A., Nanz, S. (eds.) TOOLS 2012. LNCS, vol. 7304, pp. 202\u2013218. Springer, Heidelberg (2012)"},{"key":"4_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-05032-4_7","volume-title":"Software Engineering and Formal Methods","author":"N Ng","year":"2014","unstructured":"Ng, N., Yoshida, N., Luk, W.: Scalable session programming for heterogeneous high-performance systems. In: Counsell, S., N\u00fa\u00f1ez, M. (eds.) SEFM 2013. LNCS, vol. 8368, pp. 82\u201398. Springer, Heidelberg (2014)"},{"key":"4_CR60","first-page":"22","volume":"40","author":"N Ng","year":"2012","unstructured":"Ng, N., Yoshida, N., Niu, X.Y., Tsoi, K.H., Luk, W.: Session types: towards safe and fast reconfigurable programming. SIGARCH CAN 40, 22\u201327 (2012)","journal-title":"SIGARCH CAN"},{"key":"4_CR61","doi-asserted-by":"crossref","unstructured":"Nielsen, L., Yoshida, N., Honda, K.: Multiparty symmetric sum types. In: Fr\u00f6schle, S.B., Valencia, F.D. (eds.) EXPRESS 2010. EPTCS, vol. 41, pp. 121\u2013135 (2010)","DOI":"10.4204\/EPTCS.41.9"},{"key":"4_CR62","unstructured":"Ocean Observatories Initiative (2010). http:\/\/www.oceanleadership.org\/programs-and-partnerships\/ocean-observing\/ooi\/"},{"key":"4_CR63","first-page":"72:1","volume-title":"CSL-LICS 2014","author":"L Padovani","year":"2014","unstructured":"Padovani, L.: Deadlock and Lock Freedom in the Linear $$\\pi $$-Calculus. In: Henzinger, T.A., Miller, D. (eds.) CSL-LICS 2014, pp. 72:1\u201372:10. ACM Press, New York (2014). Extended technical report available at http:\/\/hal.archives-ouvertes.fr\/hal-00932356v2\/document"},{"key":"4_CR64","unstructured":"Padovani, L.: Fair subtyping for multi-party session types. Math. Struct. Comput. Sci. 1\u201341 (2015). http:\/\/journals.cambridge.org\/article_S096012951400022X"},{"issue":"5","key":"4_CR65","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1017\/S096012950007002X","volume":"6","author":"B Pierce","year":"1996","unstructured":"Pierce, B., Sangiorgi, D.: Typing and subtyping for mobile processes. J. Math. Struct. Comput. SCi. 6(5), 409\u2013454 (1996)","journal-title":"J. Math. Struct. Comput. SCi."},{"key":"4_CR66","volume-title":"Types and Programming Languages","author":"C Benjamin","year":"2002","unstructured":"Benjamin, C.: Types and Programming Languages. MIT Press, Cambridge (2002)"},{"key":"4_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-642-04081-8_34","volume-title":"CONCUR 2009 - Concurrency Theory","author":"J Planul","year":"2009","unstructured":"Planul, J., Corin, R., Fournet, C.: Secure enforcement for global process specifications. In: Bravetti, M., Zavattaro, G. (eds.) CONCUR 2009. LNCS, vol. 5710, pp. 511\u2013526. Springer, Heidelberg (2009)"},{"key":"4_CR68","unstructured":"Savara. SAVARA JBoss RedHat Project (2010). http:\/\/www.jboss.org\/savara"},{"key":"4_CR69","unstructured":"Scribble. Scribble JBoss RedHat Project (2008). http:\/\/www.jboss.org\/scribble"},{"key":"4_CR70","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-13414-2_11","volume-title":"Coordination Models and Languages","author":"KC Sivaramakrishnan","year":"2010","unstructured":"Sivaramakrishnan, K.C., Nagaraj, K., Ziarek, L., Eugster, P.: Efficient session type guided distributed interaction. In: Clarke, D., Agha, G. (eds.) COORDINATION 2010. LNCS, vol. 6116, pp. 152\u2013167. Springer, Heidelberg (2010)"},{"key":"4_CR71","first-page":"266","volume-title":"ICFP 2011","author":"N Swamy","year":"2011","unstructured":"Swamy, N., Chen, J., Fournet, C., Strub, P.-Y., Bhargavan, K., Yang, J.: Secure distributed programming with value-dependent types. In: Chakravarty, M.M.T., Hu, Z., Danvy, O. (eds.) ICFP 2011, pp. 266\u2013278. ACM Press, New York (2011)"},{"key":"4_CR72","unstructured":"UNIFI. International Organization for Standardization ISO 20022 UNIversal Financial Industry message scheme (2002). http:\/\/www.iso20022.org"},{"key":"4_CR73","unstructured":"Web Services Choreography Working Group. Web Services Choreography Description Language (2002). http:\/\/www.w3.org\/2002\/ws\/chor\/"},{"key":"4_CR74","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/3-540-62034-6_64","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"N Yoshida","year":"1996","unstructured":"Yoshida, N.: Graph types for monadic mobile processes. In: Chandru, V., Vinay, V. (eds.) FSTTCS 1996. LNCS, vol. 1180, pp. 371\u2013386. Springer, Heidelberg (1996)"},{"key":"4_CR75","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-05119-2_3","volume-title":"Trustworthy Global Computing","author":"N Yoshida","year":"2014","unstructured":"Yoshida, N., Hu, R., Neykova, R., Ng, N.: The Scribble protocol language. In: Abadi, M., Lluch Lafuente, A. (eds.) TGC 2013. LNCS, vol. 8358, pp. 22\u201341. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Multicore Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18941-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T08:04:42Z","timestamp":1674201882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18941-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319189406","9783319189413"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18941-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"7 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}