{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:32:09Z","timestamp":1725622329335},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540076193"},{"type":"electronic","value":"9783642663192"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1976]]},"DOI":"10.1007\/978-3-642-66319-2_1","type":"book-chapter","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T20:27:15Z","timestamp":1318969635000},"page":"1-11","source":"Crossref","is-referenced-by-count":3,"title":["The Semantical Definition of Programming Languages in Terms of Their Data Spaces"],"prefix":"10.1007","author":[{"given":"Armin","family":"Cremers","sequence":"first","affiliation":[]},{"given":"Thomas N.","family":"Hibbard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Cremers, A. and T.N. Hibbard, \u201cFormal Modeling of Virtual Machines,\u201d submitted for publication, 1975."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Cremers, A.and T. N. Hibbard, \u201cOn the Relationship between a Procedure and Its Data,\u201d in preparation, 1975.","DOI":"10.1007\/3-540-07854-1_182"},{"key":"1_CR3","first-page":"135","volume":"3","author":"CAR Hoare","year":"1974","unstructured":"Hoare, C.A.R. and P.E. Lauer, \u201cConsistent and Complementary Formal Theories of the Semantics of Programming Languages,\u201d Acta Informatica3, 135\u2013153, 1974.","journal-title":"Acta Informatica"},{"key":"1_CR4","first-page":"121","volume":"25","author":"PE Lauer","year":"1971","unstructured":"Lauer, P.E., \u201cConsistent Formal Theories of the Semantics of Programming Languages,\u201d IBM Laboratory, Vienna, Technical Report, TR. 25. 121, 1971.","journal-title":"IBM Laboratory, Vienna, Technical ReportTR"},{"key":"1_CR5","unstructured":"Minsky, M.L., Computation: Finite and Infinite Machines, Prentice-Hall, 1967."},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1145\/355602.361309","volume":"15","author":"DL Parnas","year":"1972","unstructured":"Parnas, D. L., \u201cA Technique for Software Module Specification with Examples,\u201d Communications of the ACM15, 330\u2013336, 1972.","journal-title":"Communications of the ACM"},{"key":"1_CR7","volume-title":"On Attaining Reliable Software for a Secure Operating System","author":"L Robinson","year":"1975","unstructured":"Robinson, L., K. N. Levitt, P. G. Neumann, A. R. Saxena, \u201cOn Attaining Reliable Software for a Secure Operating System,\u201d Proceedings International Conference on Reliable Software, Los Angeles, 1975."},{"key":"1_CR8","volume-title":"Data Types as Lattices","author":"D Scott","year":"1972","unstructured":"Scott, D., \u201cData Types as Lattices,\u201d Lecture Notes, Advanced Course in Programming Languages, Amsterdam, 1972."}],"container-title":["Informatik-Fachberichte","Programmiersprachen"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-66319-2_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T21:50:24Z","timestamp":1606254624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-66319-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1976]]},"ISBN":["9783540076193","9783642663192"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-66319-2_1","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1976]]}}}