{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:07:43Z","timestamp":1725466063684},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642370748"},{"type":"electronic","value":"9783642370755"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37075-5_27","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T14:37:23Z","timestamp":1361198243000},"page":"418-433","source":"Crossref","is-referenced-by-count":9,"title":["Strategies as Profunctors"],"prefix":"10.1007","author":[{"given":"Glynn","family":"Winskel","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Rideau, S., Winskel, G.: Concurrent strategies. In: LICS 2011. IEEE Computer Society (2011)","key":"27_CR1","DOI":"10.1109\/LICS.2011.13"},{"issue":"2","key":"27_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1017\/S0960129509990375","volume":"20","author":"M. Hyland","year":"2010","unstructured":"Hyland, M.: Some reasons for generalising domain theory. Mathematical Structures in Computer Science\u00a020(2), 239\u2013265 (2010)","journal-title":"Mathematical Structures in Computer Science"},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1093\/comjnl\/bxp052","volume":"54","author":"G. Winskel","year":"2011","unstructured":"Winskel, G.: Events, causality and symmetry. Comput. J.\u00a054(1), 42\u201357 (2011)","journal-title":"Comput. J."},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1006\/inco.2000.2930","volume":"163","author":"S. Abramsky","year":"2000","unstructured":"Abramsky, S., Jagadeesan, R., Malacaria, P.: Full abstraction for PCF. Inf. Comput.\u00a0163(2), 409\u2013470 (2000)","journal-title":"Inf. Comput."},{"issue":"2","key":"27_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1006\/inco.2000.2917","volume":"163","author":"J.M.E. Hyland","year":"2000","unstructured":"Hyland, J.M.E., Ong, C.H.L.: On full abstraction for PCF: I, II, and III. Inf. Comput.\u00a0163(2), 285\u2013408 (2000)","journal-title":"Inf. Comput."},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1017\/S0960129505004718","volume":"15","author":"G.L. Cattani","year":"2005","unstructured":"Cattani, G.L., Winskel, G.: Profunctors, open maps and bisimulation. Mathematical Structures in Computer Science\u00a015(3), 553\u2013614 (2005)","journal-title":"Mathematical Structures in Computer Science"},{"unstructured":"Joyal, A.: Remarques sur la th\u00e9orie des jeux \u00e0 deux personnes. Gazette des sciences math\u00e9matiques du Qu\u00e9bec\u00a01(4) (1997)","key":"27_CR7"},{"doi-asserted-by":"crossref","unstructured":"Hyland, M.: Game semantics. In: Pitts, A., Dybjer, P. (eds.) Semantics and Logics of Computation. Publications of the Newton Institute (1997)","key":"27_CR8","DOI":"10.1017\/CBO9780511526619.005"},{"doi-asserted-by":"crossref","unstructured":"Harmer, R., Hyland, M., Melli\u00e8s, P.A.: Categorical combinatorics for innocent strategies. In: LICS 2007. IEEE Computer Society (2007)","key":"27_CR9","DOI":"10.1109\/LICS.2007.14"},{"unstructured":"Joyal, A.: Factorization systems. Joyal\u2019s CatLab (2012), http:\/\/ncatlab.org\/joyalscatlab\/","key":"27_CR10"},{"doi-asserted-by":"crossref","unstructured":"Curien, P.L., Plotkin, G.D., Winskel, G.: Bistructures, bidomains, and linear logic. In: Proof, Language, and Interaction, Essays in Honour of Robin Milner, pp. 21\u201354. MIT Press (2000)","key":"27_CR11","DOI":"10.7551\/mitpress\/5641.001.0001"}],"container-title":["Lecture Notes in Computer Science","Foundations of Software Science and Computation Structures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37075-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T08:36:20Z","timestamp":1595406980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37075-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642370748","9783642370755"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37075-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}