{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:32:45Z","timestamp":1725867165464},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319479576"},{"type":"electronic","value":"9783319479583"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47958-3_6","type":"book-chapter","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T09:40:52Z","timestamp":1475919652000},"page":"96-115","source":"Crossref","is-referenced-by-count":2,"title":["Binary Session Types for Psi-Calculi"],"prefix":"10.1007","author":[{"given":"Hans","family":"H\u00fcttel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,9]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Baltazar, P., Mostrous, D., Vasconcelos, V.T.: Linearly refined session types. In: LINEARITY, pp. 38\u201349 (2012)","DOI":"10.4204\/EPTCS.101.4"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bengtson, J., Johansson, M., Parrow, J., Victor, B.: psi-calculi: a framework for mobile processes with nominal data and logic. Logical Methods Comput. Sci. 7(1) (2011)","DOI":"10.2168\/LMCS-7(1:11)2011"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-662-44584-6_27","volume-title":"CONCUR 2014 \u2013 Concurrency Theory","author":"G Bernardi","year":"2014","unstructured":"Bernardi, G., Hennessy, M.: Using higher-order contracts to model session types (Extended Abstract). In: Baldan, P., Gorla, D. (eds.) CONCUR 2014. LNCS, vol. 8704, pp. 387\u2013401. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-44584-6_27"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-662-45917-1_4","volume-title":"Trustworthy Global Computing","author":"G Bernardi","year":"2014","unstructured":"Bernardi, G., Dardha, O., Gay, S.J., Kouzapas, D.: On duality relations for session types. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 51\u201366. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45917-1_4"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-05119-2_7","volume-title":"Trustworthy Global Computing","author":"J Borgstr\u00f6m","year":"2014","unstructured":"Borgstr\u00f6m, J., Gutkovas, R., Parrow, J., Victor, B., Pohjola, J.\u00c5.: A sorted semantic framework for applied process calculi (Extended Abstract). In: Abadi, M., Lluch Lafuente, A. (eds.) TGC 2013. LNCS, vol. 8358, pp. 103\u2013118. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-05119-2_7"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Castagna, G., Dezani-Ciancaglini, M., Giachino, E., Padovani, L.: Foundations of session types. In: PPDP, pp. 219\u2013230. ACM (2009)","DOI":"10.1145\/1599410.1599437"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A theory of contracts for web services. ACM Trans. Program. Lang. Syst. 31(5), 19: 1\u201319: 61 (2009)","DOI":"10.1145\/1538917.1538920"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Dardha, O., Giachino, E., Sangiorgi, D.: Session types revisited. In: Proceedings of the 14th Symposium on Principles and Practice of Declarative Programming, PPDP 2012, pp. 139\u2013150. ACM, New York (2012)","DOI":"10.1145\/2370776.2370794"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-78663-4_18","volume-title":"Trustworthy Global Computing","author":"M Dezani-Ciancaglini","year":"2008","unstructured":"Dezani-Ciancaglini, M., de\u2019Liguoro, U., Yoshida, N.: On progress for structured communications. In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, vol. 4912, pp. 257\u2013275. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78663-4_18"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. ACM Trans. Program. Lang. Syst., 29(5) (2007)","DOI":"10.1145\/1275497.1275500"},{"issue":"6","key":"6_CR11","doi-asserted-by":"crossref","first-page":"1455","DOI":"10.1093\/logcom\/exp033","volume":"19","author":"MJ Gabbay","year":"2009","unstructured":"Gabbay, M.J., Mathijssen, A.: Nominal (universal) algebra: equational logic with names and binding. J. Log. Comput. 19(6), 1455\u20131508 (2009)","journal-title":"J. Log. Comput."},{"issue":"5","key":"6_CR12","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1017\/S0960129508006944","volume":"18","author":"SJ Gay","year":"2008","unstructured":"Gay, S.J.: Bounded polymorphism in session types. Math. Struct. Comput. Sci. 18(5), 895\u2013930 (2008)","journal-title":"Math. Struct. Comput. Sci."},{"issue":"2\u20133","key":"6_CR13","first-page":"191","volume":"42","author":"SJ Gay","year":"2005","unstructured":"Gay, S.J., Hole, M.: Subtyping for session types in the pi calculus. Acta Inf. 42(2\u20133), 191\u2013225 (2005)","journal-title":"Acta Inf."},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-642-15375-4_30","volume-title":"CONCUR 2010 - Concurrency Theory","author":"M Giunti","year":"2010","unstructured":"Giunti, M., Vasconcelos, V.T.: A linear account of session types in the pi calculus. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 432\u2013446. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15375-4_30"},{"issue":"4","key":"6_CR15","doi-asserted-by":"crossref","first-page":"451","DOI":"10.3233\/JCS-2003-11402","volume":"11","author":"AD Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. J. Comput. Secur. 11(4), 451\u2013519 (2003)","journal-title":"J. Comput. Secur."},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/3-540-57208-2_35","volume-title":"CONCUR\u201993","author":"K Honda","year":"1993","unstructured":"Honda, K.: Types for dyadic interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715, pp. 509\u2013523. Springer, Heidelberg (1993). doi: 10.1007\/3-540-57208-2_35"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Honda, K.: Composing processes. In: POPL, pp. 344\u2013357 (1996)","DOI":"10.1145\/237721.237802"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998). doi: 10.1007\/BFb0053567"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-23217-6_18","volume-title":"CONCUR 2011 \u2013 Concurrency Theory","author":"H H\u00fcttel","year":"2011","unstructured":"H\u00fcttel, H.: Typed $$\\pi $$ -calculi. In: Katoen, J.-P., K\u00f6nig, B. (eds.) CONCUR 2011. LNCS, vol. 6901, pp. 265\u2013279. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23217-6_18"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-05119-2_6","volume-title":"Trustworthy Global Computing","author":"H H\u00fcttel","year":"2014","unstructured":"H\u00fcttel, H.: Types for resources in $$\\psi $$ -calculi. In: Abadi, M., Lluch Lafuente, A. (eds.) TGC 2013. LNCS, vol. 8358, pp. 83\u2013102. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-05119-2_6"},{"issue":"1\u20133","key":"6_CR21","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/S0304-3975(03)00325-6","volume":"311","author":"A Igarashi","year":"2004","unstructured":"Igarashi, A., Kobayashi, N.: A generic type system for the Pi-calculus. Theoret. Comput. Sci. 311(1\u20133), 121\u2013163 (2004)","journal-title":"Theoret. Comput. Sci."},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11817949_16","volume-title":"CONCUR 2006 \u2013 Concurrency Theory","author":"N Kobayashi","year":"2006","unstructured":"Kobayashi, N.: A new type system for deadlock-free processes. In: Baier, C., Hermanns, H. (eds.) CONCUR 2006. LNCS, vol. 4137, pp. 233\u2013247. Springer, Heidelberg (2006). doi: 10.1007\/11817949_16"},{"issue":"1","key":"6_CR23","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jlap.2004.01.004","volume":"63","author":"B K\u00f6nig","year":"2005","unstructured":"K\u00f6nig, B.: Analysing input\/output-capabilities of mobile processes with a generic type system. J. Logic Algebraic Program. 63(1), 35\u201358 (2005)","journal-title":"J. Logic Algebraic Program."},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-38493-6_17","volume-title":"Coordination Models and Languages","author":"H Torres Vieira","year":"2013","unstructured":"Torres Vieira, H., Thudichum Vasconcelos, V.: Typing progress in communication-centred systems. In: Nicola, R., Julien, C. (eds.) COORDINATION 2013. LNCS, vol. 7890, pp. 236\u2013250. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38493-6_17"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47958-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T07:30:55Z","timestamp":1568446255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47958-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319479576","9783319479583"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47958-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}