{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:24:54Z","timestamp":1725564294698},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540205364"},{"type":"electronic","value":"9783540400189"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40018-9_14","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:03:20Z","timestamp":1283727800000},"page":"195-211","source":"Crossref","is-referenced-by-count":1,"title":["Controlling and Optimizing the Usage of One Resource"],"prefix":"10.1007","author":[{"given":"Antoine","family":"Galland","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mathieu","family":"Baudet","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Baudet, M.: Contr\u00f4le de ressource et \u00e9vitement des interblocages sur la m\u00e9moire. Master\u2019s thesis, DEA Programmation (Paris), Gemplus Research Labs (September 2002)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Casset, L., Burdy, L., Requet, A.: Formal Development of an embedded verifier for Java Card Byte Code. In: The IEEE International Conference on Dependable Systems & Networks (DSN), Washington, D.C., USA, June 2002, pp. 51\u201358 (2002)","DOI":"10.1007\/3-540-45614-7_17"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Chang, B.-M., Jo, J.-W., Yi, K., Choe, K.-M.: Interprocedural Exception Analysis for Java. In: 16th ACM Symposium on Applied Computing (SAC), Las Vegas, USA (March 2001)","DOI":"10.1145\/372202.372786"},{"key":"14_CR4","series-title":"The JavaTM Series","volume-title":"Java Card TM Technology for Smart Cards : Architecture and Programmer\u2019s Guide","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card TM Technology for Smart Cards: Architecture and Programmer\u2019s Guide. The JavaTM Series. Addison Wesley, Reading (2000)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Choi, J.-D., Gupta, M., Serrano, M., Sreedhar, V.C., Midkiff, S.: Escape Analysis for JavaTm. In: ACM conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA 1999), Denver, USA, pp. 2\u201319 (1999)","DOI":"10.1145\/320384.320386"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: The 4th Annual ACM SIGPLAN-SIGACT, Los Angeles, California, pp. 238\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Crary, K., Weirich, S.: Resource Bound Certification. In: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), Boston, MA, January 2000, pp. 184\u2013198 (2000)","DOI":"10.1145\/325694.325716"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Czajkowski, G., von Eicken, T.: JRes: A Resource Accounting Interface for Java. In: Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), Canada, pp. 21\u201335 (1998)","DOI":"10.1145\/286942.286944"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"DeFouw, G., Grove, D., Chambers, C.: Fast Interprocedural Class Analysis. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), San Diego, CA, USA, pp. 222\u2013236 (1998)","DOI":"10.1145\/268946.268965"},{"key":"14_CR10","unstructured":"Deville, D., Galland, A., Grimaud, G., Jean, S.: Assessing the future of Smart Card Operating Systems. In: 4th e-Smart Conference, Sophia Antipolis, France, September 17\u201319 (2003)"},{"key":"14_CR11","unstructured":"Deville, D., Grimaud, G.: Building an \u201cimpossible\u201d verifier on a Java Card. In: 2nd USENIX Workshop on Industrial Experiences with Systems Software (WIESS), Boston, USA (December 2002)"},{"key":"14_CR12","first-page":"43","volume-title":"Programming Languages: NATO Advanced Study Institute","author":"E.W. Dijkstra","year":"1968","unstructured":"Dijkstra, E.W.: Cooperating sequential processes. In: Genuys, F. (ed.) Programming Languages: NATO Advanced Study Institute, pp. 43\u2013112. Academic Press, London (1968)"},{"issue":"4","key":"14_CR13","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TRA.2002.801048","volume":"18","author":"J. Ezpeleta","year":"2002","unstructured":"Ezpeleta, J., Tricas, F., Garcia-Valles, F., Colom, J.: A banker\u2019s solution for deadlock avoidance in FMS with flexible routing and multiresource states. IEEE Transactions on Robotics & Automation\u00a018(4), 621\u2013625 (2002)","journal-title":"IEEE Transactions on Robotics & Automation"},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1137\/0207027","volume":"7","author":"E.M. Gold","year":"1978","unstructured":"Gold, E.M.: Deadlock prediction: Easy and difficult cases. SIAM Journal on Computing\u00a07(3), 320\u2013336 (1978)","journal-title":"SIAM Journal on Computing"},{"issue":"7","key":"14_CR15","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1145\/363156.363160","volume":"12","author":"N.A. Habermann","year":"1969","unstructured":"Habermann, N.A.: Prevention of system deadlocks. Communications of the ACM\u00a012(7), 373\u2013377 (1969)","journal-title":"Communications of the ACM"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Hofmann, M., Jost, S.: Static prediction of heap space usage for first-order functional programs. In: Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), New Orleans (2003)","DOI":"10.1145\/604131.604148"},{"key":"14_CR17","unstructured":"JavaTM 2 Platform Micro Edition (J2METM). Connected Limited Device Configuration (CLDC) Specification Version 1.0, http:\/\/java.sun.com\/j2me\/"},{"key":"14_CR18","volume-title":"The Art of Computer Programming","author":"D.E. Knuth","year":"1998","unstructured":"Knuth, D.E.: The Art of Computer Programming, 2nd edn., vol.\u00a03. Addison Wesley Longman Publishing Co., Inc., Amsterdam (1998)","edition":"2"},{"key":"14_CR19","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: USENIX Workshop on Smartcard Technology (Smartcard 1999), Chicago, Illinois, USA, May 10\u201311, pp. 9\u201320 (1999)"},{"key":"14_CR20","unstructured":"Lagosanto, L.: Next-Generation Embedded Java Operating System for Smart Cards. In: Gemplus Developer Conference, Singapore (November 2002)"},{"issue":"4","key":"14_CR21","first-page":"385","volume":"13","author":"M. Lawley","year":"2001","unstructured":"Lawley, M., Reveliotis, S.: Deadlock Avoidance for Sequential Resource Allocation Systems: Hard and Easy Cases. The Journal of FMS\u00a013(4), 385\u2013404 (2001)","journal-title":"The Journal of FMS"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-45440-3_2","volume-title":"Component Deployment","author":"N. Sommer le","year":"2002","unstructured":"le Sommer, N., Guidec, F.: A Contract-Based Approach of Resource-Constrained Software Deployment. In: Bishop, J.M. (ed.) CD 2002. LNCS, vol.\u00a02370, pp. 15\u201330. Springer, Heidelberg (2002)"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X. Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode Verification for Java smart card. Software Practice & Experience\u00a032, 319\u2013340 (2002)","journal-title":"Software Practice & Experience"},{"key":"14_CR24","unstructured":"Mobile Resource Guarantees (MRG). European Project IST-2001-33149 (2002), http:\/\/www.dcs.ed.ac.uk\/home\/mrg\/"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof\u2013Carrying Code. In: the 24th ACM SIGPLAN-SIGACT symposium on principles of programming Languages, Paris, France (January 1997)","DOI":"10.1145\/263699.263712"},{"key":"14_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0167-739X(97)89108-X","volume":"13","author":"J.-J. Quisquater","year":"1997","unstructured":"Quisquater, J.-J.: The adolescence of smart cards. Future Generation Computer Systems\u00a013, 3\u20137 (1997)","journal-title":"Future Generation Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40018-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T18:06:02Z","timestamp":1636394762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40018-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540205364","9783540400189"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40018-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}