{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T20:44:34Z","timestamp":1760820274904},"publisher-location":"Berlin, Heidelberg","reference-count":71,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540205838"},{"type":"electronic","value":"9783540400424"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40042-4_4","type":"book-chapter","created":{"date-parts":[[2010,9,4]],"date-time":"2010-09-04T00:35:00Z","timestamp":1283560500000},"page":"88-150","source":"Crossref","is-referenced-by-count":45,"title":["The Klaim Project: Theory and Practice"],"prefix":"10.1007","author":[{"given":"Lorenzo","family":"Bettini","sequence":"first","affiliation":[]},{"given":"Viviana","family":"Bono","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"De Nicola","sequence":"additional","affiliation":[]},{"given":"Gianluigi","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Gorla","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Loreti","sequence":"additional","affiliation":[]},{"given":"Eugenio","family":"Moggi","sequence":"additional","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Tuosto","sequence":"additional","affiliation":[]},{"given":"Betti","family":"Venneri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8598-9","volume-title":"A Theory of Objects","author":"M. Abadi","year":"1996","unstructured":"Abadi, M., Cardelli, L.: A Theory of Objects. Springer, Heidelberg (1996)"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/103135.103138","volume":"13","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., Cardelli, L., Pierce, B., Plotkin, G.: Dynamic typing in a statically typed language. ACM Transactions on Programming Languages and Systems\u00a013(2), 237\u2013268 (1991)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1017\/S095679680000126X","volume":"5","author":"M. Abadi","year":"1995","unstructured":"Abadi, M., Cardelli, L., Pierce, B., Remy, D.: Dynamic typing in polymorphic languages. Journal of Functional Programming\u00a05(1), 111\u2013130 (1995)","journal-title":"Journal of Functional Programming"},{"key":"4_CR4","volume-title":"JavaSpaces Principles, Patterns and Practice","author":"K. Arnold","year":"1999","unstructured":"Arnold, K., Freeman, E., Hupfer, S.: JavaSpaces Principles, Patterns and Practice. Addison-Wesley, Reading (1999)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Ancona, D., Lagorio, G., Zucca, E.: Jam - designing a java extension with mixins. ACM Transaction on Programming Languages and Systems (2003) (to appear)","DOI":"10.1145\/937563.937567"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-55160-3_37","volume-title":"Research Directions in High-Level Parallel Programming Languages","author":"B.G. Anderson","year":"1992","unstructured":"Anderson, B.G., Shasha, D.: Persistent Linda: Linda + Transactions + Query Processing. In: Ban\u00e2tre, J.-P., Le M\u00e9tayer, D. (eds.) Research Directions in High-Level Parallel Programming Languages 1991. LNCS, vol.\u00a0574, pp. 93\u2013109. Springer, Heidelberg (1992)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/3-540-46000-4_8","volume-title":"Coordination Models and Languages","author":"L. Bettini","year":"2002","unstructured":"Bettini, L., Bono, V., Venneri, B.: Coordinating Mobile Object-Oriented Code. In: Arbab, F., Talcott, C. (eds.) COORDINATION 2002. LNCS, vol.\u00a02315, pp. 56\u201371. Springer, Heidelberg (2002)"},{"key":"4_CR8","unstructured":"Bettini, L., Bono, V., Venneri, B.: MoMi - A Calculus for Mobile Mixins (2003) (manuscript)"},{"key":"4_CR9","unstructured":"Bettini, L., Bono, V., Venneri, B.: Subtyping Mobile Clasees and Mixins. In: Proc. of Foundation of Object Oriented Languages, FOOL10 (2003)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Bracha, G., Cook, W.: Mixin-based inheritance. In: Proc. OOPSLA 1990, pp. 303\u2013311 (1990)","DOI":"10.1145\/97945.97982"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44685-0_8","volume-title":"CONCUR 2001 - Concurrency Theory","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Reasoning about security in mobile ambients. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 102\u2013120. Springer, Heidelberg (2001)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-45647-3_13","volume-title":"Mobile Agents","author":"L. Bettini","year":"2001","unstructured":"Bettini, L., De Nicola, R.: Translating Strong Mobility into Weak Mobility. In: Picco, G.P. (ed.) MA 2001. LNCS, vol.\u00a02240, pp. 182\u2013197. Springer, Heidelberg (2001)"},{"key":"4_CR13","first-page":"110","volume-title":"Proc. of the 7th Int. IEEE Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","author":"L. Bettini","year":"1998","unstructured":"Bettini, L., De Nicola, R., Ferrari, G., Pugliese, R.: Interactive Mobile Agents in X-Klaim. In: Ciancarini, P., Tolksdorf, R. (eds.) Proc. of the 7th Int. IEEE Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Stanford, pp. 110\u2013115. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Bettini, L., De Nicola, R., Loreti, M.: Formulae meet programs over the net: a framework for correct network aware programming (2003) (submitted for publication), available at http:\/\/music.dsi.unifi.it\/","DOI":"10.1023\/B:AUSE.0000028536.34044.47"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1002\/spe.486","volume":"32","author":"L. Bettini","year":"2002","unstructured":"Bettini, L., De Nicola, R., Pugliese, R.: Klava: a Java Package for Distributed and Mobile Applications. Software \u2014 Practice and Experience\u00a032, 1365\u20131394 (2002)","journal-title":"Software \u2014 Practice and Experience"},{"key":"4_CR16","unstructured":"Bettini, L.: Linguistic Constructs for Object-Oriented Mobile Code Programming & their Implementations. PhD thesis, Dip. di Matematica, Universit\u00e0 di Siena (2003), Available at http:\/\/music.dsi.unifi.it"},{"key":"4_CR17","first-page":"373","volume-title":"Proc. of ACM SAC 2002, Special Track on Coordination Models, Languages and Applications","author":"L. Bettini","year":"2002","unstructured":"Bettini, L., Loreti, M., Pugliese, R.: An Infrastructure Language for Open Nets. In: Proc. of ACM SAC 2002, Special Track on Coordination Models, Languages and Applications, pp. 373\u2013377. ACM, New York (2002)"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/256303.256306","volume":"44","author":"S. Bistarelli","year":"1997","unstructured":"Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimization. Journal of the ACM\u00a044(2), 201\u2013236 (1997)","journal-title":"Journal of the ACM"},{"issue":"6","key":"4_CR19","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1002\/cpe.4330060603","volume":"6","author":"P. Butcher","year":"1994","unstructured":"Butcher, P., Wood, A., Atkins, M.: Global Synchronisation in Linda. Concurrency: Practice and Experience\u00a06(6), 505\u2013516 (1994)","journal-title":"Concurrency: Practice and Experience"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Cardelli, L.: Abstractions for Mobile Computation. In: Vitek and Jensen [VJ99], pp. 51\u201394","DOI":"10.1007\/3-540-48749-2_4"},{"key":"4_CR21","unstructured":"Castellani, S., Ciancarini, P., Rossi, D.: The ShaPE of ShaDE: a coordination system. Technical Report UBLCS 96-5, Dip. di Scienze dell\u2019Informazione, Univ. di Bologna, Italy (1996)"},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/72551.72553","volume":"21","author":"N. Carriero","year":"1989","unstructured":"Carriero, N., Gelernter, D.: How to Write Parallel Programs: A Guide to the Perplexed. ACM Computing Surveys\u00a021(3), 323\u2013357 (1989)","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"4_CR23","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0304-3975(99)00231-5","volume":"240","author":"L. Cardelli","year":"1998","unstructured":"Cardelli, L., Gordon, A.D.: Mobile ambients. Theoretical Computer Science\u00a0240(1), 177\u2013213 (1998); An extended abstract appeared in Nivat, M. (ed.) FOSSACS 1998. LNCS, vol.\u00a01378, p. 140. Springer, Heidelberg (1998)","journal-title":"Theoretical Computer Science"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-44685-0_7","volume-title":"CONCUR 2001 - Concurrency Theory","author":"G. Castagna","year":"2001","unstructured":"Castagna, G., Ghelli, G., Zappa Nardelli, F.: Typing mobility in the seal calculus. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 82\u2013101. Springer, Heidelberg (2001)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Scott Corson, M., Macker, J.P., Cirincione, G.H.: Internetbased mobile ad hoc networking. Internet Computing 3(4) (1999)","DOI":"10.1109\/4236.780962"},{"issue":"5","key":"4_CR26","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/32.685259","volume":"24","author":"P. Ciancarini","year":"1998","unstructured":"Ciancarini, P., Tolksdorf, R., Vitali, F., Rossi, D., Knoche, A.: Coordinating multiagent applications on the WWW: A reference architecture. IEEE Transactions on Software Engineering\u00a024(5), 362\u2013366 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-47959-7_3","volume-title":"Internet Programming Languages","author":"G. Castagna","year":"1999","unstructured":"Castagna, G., Vitek, J.: Seal: A framework for secure mobile computations. In: Bal, H.E., Cardelli, L., Belkhouche, B. (eds.) ICCL-WS 1998. LNCS, vol.\u00a01686, pp. 47\u201377. Springer, Heidelberg (1999)"},{"key":"4_CR28","first-page":"278","volume-title":"Proc. of ISADS 2001","author":"D. Deugo","year":"2001","unstructured":"Deugo, D.: Choosing a Mobile Agent Messaging Model. In: Proc. of ISADS 2001, pp. 278\u2013286. IEEE, Los Alamitos (2001)"},{"key":"4_CR29","series-title":"LNCS","volume-title":"International Symposium on Verification \u2013 Theory and Practice \u2013 Honoring Zohar Manna\u2019s 64th Birthday","author":"R. Nicola De","year":"2003","unstructured":"De Nicola, R., Ferrari, G., Montanari, U., Pugliese, R., Tuosto, E.: A formal basis for reasoning on programmable qos. In: International Symposium on Verification \u2013 Theory and Practice \u2013 Honoring Zohar Manna\u2019s 64th Birthday. LNCS, Springer, Heidelberg (2003)"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1007\/BFb0030636","volume-title":"TAPSOFT\u201997: Theory and Practice of Software Development","author":"R. Nicola De","year":"1997","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Locality based Linda: Programming with explicit localities. In: Bidoit, M., Dauchet, M. (eds.) CAAP 1997, FASE 1997, and TAPSOFT 1997. LNCS, vol.\u00a01214, pp. 712\u2013726. Springer, Heidelberg (1997)"},{"issue":"5","key":"4_CR31","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R. Nicola De","year":"1998","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Klaim: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering\u00a024(5), 315\u2013330 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Types as Specifications of Access Policies. In: Vitek and Jensen [VJ99], pp. 117\u2013146","DOI":"10.1007\/3-540-48749-2_6"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-44618-4_5","volume-title":"CONCUR 2000 - Concurrency Theory","author":"R. Nicola De","year":"2000","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Programming Access Control: The Klaim Experience. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 48\u201365. Springer, Heidelberg (2000)"},{"issue":"1","key":"4_CR34","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/S0304-3975(99)00232-7","volume":"240","author":"R. Nicola De","year":"2000","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R., Venneri, B.: Types for Access Control. Theoretical Computer Science special issue on Coordination\u00a0240(1), 215\u2013254 (2000)","journal-title":"Theoretical Computer Science special issue on Coordination"},{"key":"4_CR35","unstructured":"De Nicola, R., Loreti, M.: A Modal Logic for Mobile Agents. ACM Transactions on Computational Logic (2002) (to appear), Available at http:\/\/music.dsi.unifi.it\/"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-61052-9_45","volume-title":"Coordination Languages and Models","author":"R. Nicola De","year":"1996","unstructured":"De Nicola, R., Pugliese, R.: A process algebra based on linda. In: Hankin, C., Ciancarini, P. (eds.) COORDINATION 1996. LNCS, vol.\u00a01061, pp. 160\u2013178. Springer, Heidelberg (1996)"},{"issue":"1","key":"4_CR37","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/314602.314604","volume":"21","author":"D. Duggan","year":"1999","unstructured":"Duggan, D.: Dynamic typing for distributed programming in polymorphic languages. ACM Transactions on Programming Languages and Systems\u00a021(1), 11\u201345 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Davies, N., Wade, S., Friday, A., Blair, G.: Limbo: a tuple space based platform for adaptive mobile applications. In: Int. Conference on Open Distributed Processing\/Distributed Platforms, ICODP\/ICDP 1997 (1997)","DOI":"10.1007\/978-0-387-35188-9_22"},{"key":"4_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/3-540-61604-7_67","volume-title":"CONCUR \u201996: Concurrency Theory","author":"C. Fournet","year":"1996","unstructured":"Fournet, C., Gonthier, G., Levy, J.J., Maranget, L., Remy, D.: A Calculus of Mobile Agents. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol.\u00a01119, pp. 406\u2013421. Springer, Heidelberg (1996)"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and mixins. In: Proc. POPL 1998, pp. 171\u2013183 (1998)","DOI":"10.1145\/268946.268961"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Ferrari, G., Moggi, E., Pugliese, R.: MetaKlaim: A type safe multi-stage language for global computing. Mathematical Structures in Computer Science (2003)","DOI":"10.1017\/S0960129504004165"},{"key":"4_CR42","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/A:1014530313153","volume":"9","author":"G. Ferrari","year":"2002","unstructured":"Ferrari, G., Montangero, C., Semini, L., Semprini, S.: Mark, a reasoning kit for mobility. Automated Software Engineering\u00a09, 137\u2013150 (2002)","journal-title":"Automated Software Engineering"},{"issue":"5","key":"4_CR43","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1109\/32.685258","volume":"24","author":"A. Fuggetta","year":"1998","unstructured":"Fuggetta, A., Picco, G., Vigna, G.: Understanging code mobility. IEEE Transactions on Software Engineering\u00a024(5), 342\u2013361 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"4_CR44","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D. Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative Communication in Linda. ACM Transactions on Programming Languages and Systems\u00a07(1), 80\u2013112 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"4_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/3-540-51285-3_30","volume-title":"PARLE \u201989 - Parallel Architectures and Languages Europe","author":"D. Gelernter","year":"1989","unstructured":"Gelernter, D.: Multiple Tuple Spaces in Linda. In: Odijk, E., Syre, J.-C., Rem, M. (eds.) PARLE 1989. LNCS, vol.\u00a0365, pp. 20\u201327. Springer, Heidelberg (1989)"},{"key":"4_CR46","unstructured":"Girard, J.-Y.: Interpr\u00e9tation fonctionelle et \u00e9limination des coupures dans l\u2019arithm\u00e9tique d\u2019ordre sup\u00e9rieur. Th\u00e8se de doctorat d\u2019etat, University of Paris VII (1972)"},{"key":"4_CR47","unstructured":"Gorla, D., Pugliese, R.: Behavioural equivalences for distributed and mobile systems. Research report, Dipartimento di Sistemi e Informatica, Universit\u00e0 di Firenze (2003), Available at http:\/\/rap.dsi.unifi.it\/~pugliese\/DOWNLOAD\/bis4klaim.pdf"},{"key":"4_CR48","series-title":"LNCS","volume-title":"Proc. of the 1st International Conference on Security in Pervasive Computing (SPC 2003)","author":"D. Gorla","year":"2003","unstructured":"Gorla, D., Pugliese, R.: Enforcing Security Policies via Types. In: Proc. of the 1st International Conference on Security in Pervasive Computing (SPC 2003). LNCS, Springer, Heidelberg (2003)"},{"key":"4_CR49","unstructured":"Gorla, D., Pugliese, R.: Resource access and mobility control with dynamic privileges acquisition. Research report, Dipartimento di Sistemi e Informatica, Universit\u00e0 di Firenze (2003). An extended abstract appeared in Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, Springer, Heidelberg (2003), Available at http:\/\/rap.dsi.unifi.it\/~pugliese\/DOWNLOAD\/muklaim-full.pdf"},{"issue":"1","key":"4_CR50","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/2455.2460","volume":"32","author":"M. Hennessy","year":"1985","unstructured":"Hennessy, M., Milner, R.: Algebraic Laws for Nondeterminism and Concurrency. Journal of the ACM\u00a032(1), 137\u2013161 (1985)","journal-title":"Journal of the ACM"},{"issue":"1","key":"4_CR51","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Information and Computation\u00a0173(1), 82\u2013120 (2002)","journal-title":"Information and Computation"},{"key":"4_CR52","unstructured":"Loreti, M.: Languages and Logics for Network Aware Programming. PhD thesis, Universit\u00e0 di Siena (2002), Available at http:\/\/music.dsi.unifi.it"},{"key":"4_CR53","unstructured":"Leroy, X., R\u00e9my, D., Vouillon, J., Doligez, D.: The Objective Caml system, documentation and user\u2019s guide (1999), http:\/\/caml.inria.fr\/ocaml\/htmlman\/"},{"key":"4_CR54","unstructured":"The MetaML Home Page (2000), Provides source code and documentation online at http:\/\/www.cse.ogi.edu\/PacSoft\/projects\/metaml\/index.html"},{"issue":"1","key":"4_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R. Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, J.: A Calculus of Mobile Processes, I and II. Information and Computation\u00a0100(1), 1\u201340, 41\u201377 (1992)","journal-title":"Information and Computation"},{"issue":"2","key":"4_CR56","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/32.666824","volume":"24","author":"P.J. McCann","year":"1998","unstructured":"McCann, P.J., Roman, G.-C.: Compositional programming abstraction for mobile computing. IEEE Transactions on Software Engineering\u00a024(2), 97\u2013110 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR57","unstructured":"Oracle. Oracle 9iAS application server lite web page (1999), http:\/\/www.oracle.com\/"},{"issue":"3","key":"4_CR58","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/A:1010060322135","volume":"2","author":"A. Omicini","year":"1999","unstructured":"Omicini, A., Zambonelli, F.: Coordination for internet application development. Autonomous Agents and Multi-agent Systems\u00a02(3), 251\u2013269 (1999); Special Issue on Coordination Mechanisms and Patterns for Web Agents","journal-title":"Autonomous Agents and Multi-agent Systems"},{"key":"4_CR59","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1145\/302405.302659","volume-title":"Proc. of the 21st Int. Conference on Software Engineering (ICSE 1999)","author":"G.P. Picco","year":"1999","unstructured":"Picco, G.P., Murphy, A.L., Roman, G.-C.: Lime: Linda Meets Mobility. In: Garlan, D. (ed.) Proc. of the 21st Int. Conference on Software Engineering (ICSE 1999), pp. 368\u2013377. ACM Press, New York (1999)"},{"key":"4_CR60","unstructured":"Park, A.S., Reichl, P.: Personal Disconnected Operations with Mobile Agents. In: Proc. of 3rd Workshop on Personal Wireless Communications, PWC 1998, Tokyo (1998)"},{"key":"4_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/3-540-06859-7_148","volume-title":"Programming Symposium","author":"J.C. Reynolds","year":"1974","unstructured":"Reynolds, J.C.: Towards a theory of type structure. In: Robinet, B. (ed.) Programming Symposium. LNCS, vol.\u00a019, pp. 408\u2013425. Springer, Heidelberg (1974); Extension of typed lambda calculus to user-defined types and polymorphic functions"},{"issue":"3","key":"4_CR62","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/A:1019263731139","volume":"1","author":"A. Rowstron","year":"1998","unstructured":"Rowstron, A.: WCL: A web co-ordination language. World Wide Web Journal\u00a01(3), 167\u2013179 (1998)","journal-title":"World Wide Web Journal"},{"key":"4_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/3-540-44577-3_6","volume-title":"Informatics","author":"F.B. Schneider","year":"2001","unstructured":"Schneider, F.B., Morrisett, G., Harper, R.: A language-based approach to security. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol.\u00a02000, pp. 86\u2013101. Springer, Heidelberg (2001)"},{"key":"4_CR64","unstructured":"Sun Microsystems. Javaspace specification (1999), available at http:\/\/java.sun.com\/"},{"key":"4_CR65","doi-asserted-by":"crossref","unstructured":"Taha, W., Sheard, T.: MetaML: Multi-stage programming with explicit annotations. Theoretical Computer Science\u00a0248(1-2) (2000)","DOI":"10.1016\/S0304-3975(00)00053-0"},{"key":"4_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-48753-0_18","volume-title":"Reliable Software Technologies - Ada-Europe \u201999","author":"E. Tuosto","year":"1999","unstructured":"Tuosto, E.: An ada95 implementation of a network coordination language with code mobility. In: Gonz\u00e1lez Harbour, M., la de Puente, J.A. (eds.) Ada-Europe 1999. LNCS, vol.\u00a01622, pp. 199\u2013210. Springer, Heidelberg (1999)"},{"key":"4_CR67","series-title":"LNCS","volume-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects","year":"1999","unstructured":"Vitek, J., Jensen, C. (eds.): Secure Internet Programming: Security Issues for Mobile and Distributed Objects. LNCS, vol.\u00a01603. Springer, Heidelberg (1999)"},{"issue":"1","key":"4_CR68","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1006\/inco.1994.1093","volume":"115","author":"A.K. Wright","year":"1994","unstructured":"Wright, A.K., Felleisen, M.: A syntactic approach to type soundness. Information and Computation\u00a0115(1), 38\u201394 (1994)","journal-title":"Information and Computation"},{"issue":"3","key":"4_CR69","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1147\/sj.373.0454","volume":"37","author":"P. Wyckoff","year":"1998","unstructured":"Wyckoff, P., McLaughry, S., Lehman, T., Ford, D.: TSpaces. IBM Systems Journal\u00a037(3), 454\u2013474 (1998)","journal-title":"IBM Systems Journal"},{"key":"4_CR70","doi-asserted-by":"crossref","unstructured":"Wand, M., Siveroni, I.: Constraint systems for useless variable elimination. In: Proceedings of the ACM Symposium on Principles of Programming Languages (POPL), pp. 291\u2013302 (1999)","DOI":"10.1145\/292540.292567"},{"key":"4_CR71","unstructured":"Yoshida, N., Hennessy, M.: Assigning types to processes. CogSci Report 99.02, School of Cognitive and Computing Sciences, University of Sussex, UK (1999)"}],"container-title":["Lecture Notes in Computer Science","Global Computing. Programming Environments, Languages, Security, and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40042-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T13:12:18Z","timestamp":1559567538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40042-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540205838","9783540400424"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40042-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}