{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:15:59Z","timestamp":1775769359996,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662544938","type":"print"},{"value":"9783662544945","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54494-5_7","type":"book-chapter","created":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:09:02Z","timestamp":1490141342000},"page":"116-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Explicit Connection Actions in Multiparty Session Types"],"prefix":"10.1007","author":[{"given":"Raymond","family":"Hu","sequence":"first","affiliation":[]},{"given":"Nobuko","family":"Yoshida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"issue":"2\u20133","key":"7_CR1","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1561\/2500000031","volume":"3","author":"D Ancona","year":"2016","unstructured":"Ancona, D., et al.: Behavioral types in programming languages. Found. Trends Program. Lang. 3(2\u20133), 95\u2013230 (2016)","journal-title":"Found. Trends Program. Lang."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Basu, S., Bultan, T.: Automatic verification of interactions in asynchronous systems with unbounded buffers. In: ASE 2014, pp. 743\u2013754. ACM (2014)","DOI":"10.1145\/2642937.2643016"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-662-49665-7_2","volume-title":"Fundamental Approaches to Software Engineering","author":"S Basu","year":"2016","unstructured":"Basu, S., Bultan, T.: Automated choreography repair. In: Stevens, P., W\u0105sowski, A. (eds.) FASE 2016. LNCS, vol. 9633, pp. 13\u201330. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49665-7_2"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Basu, S., Bultan, T., Ouederni, M.: Deciding choreography realizability. In: POPL 2012, pp. 191\u2013202. ACM (2012)","DOI":"10.1145\/2103621.2103680"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-15375-4_12","volume-title":"CONCUR 2010 - Concurrency Theory","author":"L Bocchi","year":"2010","unstructured":"Bocchi, L., Honda, K., Tuosto, E., Yoshida, N.: A theory of design-by-contract for distributed multiparty interactions. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 162\u2013176. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-15375-4_12"},{"key":"7_CR6","unstructured":"Bocchi, L., Lange, J., Yoshida, N.: Meeting deadlines together. In: CONCUR 2015. LIPIcs, vol. 42, pp. 283\u2013296. Schloss Dagstuhl (2015)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-37064-9_17","volume-title":"Language and Automata Theory and Applications","author":"B Bollig","year":"2013","unstructured":"Bollig, B., Cyriac, A., H\u00e9lou\u00ebt, L., Kara, A., Schwentick, T.: Dynamic communicating automata and branching high-level MSCs. In: Dediu, A.-H., Mart\u00edn-Vide, C., Truthe, B. (eds.) LATA 2013. LNCS, vol. 7810, pp. 177\u2013189. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-37064-9_17"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-13182-0_5","volume-title":"Computer Science \u2013 Theory and Applications","author":"B Bollig","year":"2010","unstructured":"Bollig, B., H\u00e9lou\u00ebt, L.: Realizability of dynamic MSC languages. In: Ablayev, F., Mayr, E.W. (eds.) CSR 2010. LNCS, vol. 6072, pp. 48\u201359. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-13182-0_5"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D Brand","year":"1983","unstructured":"Brand, D., Zafiropulo, P.: On communicating finite-state machines. J. ACM 30, 323\u2013342 (1983)","journal-title":"J. ACM"},{"issue":"51\u201352","key":"7_CR10","doi-asserted-by":"publisher","first-page":"4399","DOI":"10.1016\/j.tcs.2010.09.010","volume":"411","author":"L Caires","year":"2010","unstructured":"Caires, L., Vieira, H.T.: Conversation types. Theor. Comput. Sci. 411(51\u201352), 4399\u20134440 (2010)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ic.2005.05.006","volume":"202","author":"G C\u00e9c\u00e9","year":"2005","unstructured":"C\u00e9c\u00e9, G., Finkel, A.: Verification of programs with half-duplex communication. Inf. Comput. 202(2), 166\u2013190 (2005)","journal-title":"Inf. Comput."},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0960129515000304","volume":"760","author":"M Coppo","year":"2015","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Yoshida, N., Padovani, L.: Global progress for dynamically interleaved multiparty sessions. Math. Struct. Comput. Sci. 760, 1\u201365 (2015)","journal-title":"Math. Struct. Comput. Sci."},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-23217-6_19","volume-title":"CONCUR 2011 \u2013 Concurrency Theory","author":"R Demangeon","year":"2011","unstructured":"Demangeon, R., Honda, K.: Full abstraction in a subtyped pi-calculus with linear types. In: Katoen, J.-P., K\u00f6nig, B. (eds.) CONCUR 2011. LNCS, vol. 6901, pp. 280\u2013296. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-23217-6_19"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-32940-1_20","volume-title":"CONCUR 2012 \u2013 Concurrency Theory","author":"R Demangeon","year":"2012","unstructured":"Demangeon, R., Honda, K.: Nested protocols in session types. In: Koutny, M., Ulidowski, I. (eds.) CONCUR 2012. LNCS, vol. 7454, pp. 272\u2013286. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32940-1_20"},{"key":"7_CR15","unstructured":"Demangeon, R., Honda, K., Hu, R., Neykova, R., Yoshida, N.: Practical interruptible conversations: distributed dynamic verification with multiparty session types and python. In: Formal Methods in System Design, pp. 1\u201329 (2015)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Dynamic multirole session types. In: POPL 2011, pp. 435\u2013446. ACM (2011)","DOI":"10.1145\/1925844.1926435"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-28869-2_10","volume-title":"Programming Languages and Systems","author":"P-M Deni\u00e9lou","year":"2012","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Multiparty session types meet communicating automata. In: Seidl, H. (ed.) ESOP 2012. LNCS, vol. 7211, pp. 194\u2013213. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-28869-2_10"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-39212-2_18","volume-title":"Automata, Languages, and Programming","author":"P-M Deni\u00e9lou","year":"2013","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Multiparty compatibility in communicating automata: characterisation and synthesis of global session types. In: Fomin, F.V., Freivalds, R., Kwiatkowska, M., Peleg, D. (eds.) ICALP 2013. LNCS, vol. 7966, pp. 174\u2013186. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39212-2_18"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Fowler, S.: An erlang implementation of multiparty session actors. In: ICE 2016. EPTCS, vol. 223, pp. 36\u201350 (2016)","DOI":"10.4204\/EPTCS.223.3"},{"issue":"2\/3","key":"7_CR20","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00236-005-0177-z","volume":"42","author":"S Gay","year":"2005","unstructured":"Gay, S., Hole, M.: Subtyping for session types in the pi-calculus. Acta Informatica 42(2\/3), 191\u2013225 (2005)","journal-title":"Acta Informatica"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: POPL 2008, pp. 273\u2013284. ACM (2008)","DOI":"10.1145\/1328897.1328472"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2827695","volume":"63","author":"K Honda","year":"2016","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. J. ACM 63(1), 9 (2016)","journal-title":"J. ACM"},{"key":"7_CR23","unstructured":"Hu, R., Yoshida, N.: Explicit Connection Actions in Multiparty Session Types (Long Version). https:\/\/www.doc.ic.ac.uk\/rhu\/~scribble\/explicit.html"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-662-49665-7_24","volume-title":"Fundamental Approaches to Software Engineering","author":"R Hu","year":"2016","unstructured":"Hu, R., Yoshida, N.: Hybrid session verification through endpoint API generation. In: Stevens, P., W\u0105sowski, A. (eds.) FASE 2016. LNCS, vol. 9633, pp. 401\u2013418. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49665-7_24"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/978-3-540-70592-5_22","volume-title":"ECOOP 2008 \u2013 Object-Oriented Programming","author":"R Hu","year":"2008","unstructured":"Hu, R., Yoshida, N., Honda, K.: Session-based distributed programming in java. In: Vitek, J. (ed.) ECOOP 2008. LNCS, vol. 5142, pp. 516\u2013541. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-70592-5_22"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Imai, K., Yuen, S., Agusa, K.: Session type inference in haskell. In: PLACES. EPTCS, vol. 69, pp. 74\u201391 (2010)","DOI":"10.4204\/EPTCS.69.6"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Jespersen, T.B.L., Munksgaard, P., Larsen, K.F.: Session types for rust. In: WGP 2015, pp. 13\u201322. ACM (2015)","DOI":"10.1145\/2808098.2808100"},{"key":"7_CR28","unstructured":"Klensin, J.: IETF RFC 5321 Simple Mail Transfer Protocol. https:\/\/tools.ietf.org\/html\/rfc5321"},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1017\/S096012951400019X","volume":"26","author":"D Kouzapas","year":"2016","unstructured":"Kouzapas, D., Yoshida, N., Hu, R., Honda, K.: On asynchronous eventful session semantics. Math. Struct. Comput. Sci. 26(2), 303\u2013364 (2016)","journal-title":"Math. Struct. Comput. Sci."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Lange, J., Tuosto, E., Yoshida, N.: From communicating machines to graphical choreographies. In: POPL 2015, pp. 221\u2013232. ACM (2015)","DOI":"10.1145\/2775051.2676964"},{"key":"7_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/3-540-36206-1_23","volume-title":"FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science","author":"M Leucker","year":"2002","unstructured":"Leucker, M., Madhusudan, P., Mukhopadhyay, S.: Dynamic message sequence charts. In: Agrawal, M., Seth, A. (eds.) FSTTCS 2002. LNCS, vol. 2556, pp. 253\u2013264. Springer, Heidelberg (2002). doi:10.1007\/3-540-36206-1_23"},{"key":"7_CR32","unstructured":"Lindley, S., Morris, J.G.: Lightweight Functional Session Types. http:\/\/homepages.inf.ed.ac.uk\/slindley\/papers\/fst-draft-february2015.pdf"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Neykova, R., Bocchi, L., Yoshida, N.: Timed runtime monitoring for multiparty conversations. In: BEAT 2014. EPTCS, vol. 162, pp. 19\u201326 (2014)","DOI":"10.4204\/EPTCS.162.3"},{"key":"7_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-40787-1_25","volume-title":"Runtime Verification","author":"R Neykova","year":"2013","unstructured":"Neykova, R., Yoshida, N., Hu, R.: SPY: local verification of global protocols. In: Legay, A., Bensalem, S. (eds.) RV 2013. LNCS, vol. 8174, pp. 358\u2013363. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40787-1_25"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-662-46663-6_11","volume-title":"Compiler Construction","author":"N Ng","year":"2015","unstructured":"Ng, N., Figueiredo Coutinho, J.G., Yoshida, N.: Protocols by default. In: Franke, B. (ed.) CC 2015. LNCS, vol. 9031, pp. 212\u2013232. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-46663-6_11"},{"key":"7_CR36","unstructured":"Padovani, L.: FuSe homepage. http:\/\/www.di.unito.it\/padovani\/Software\/FuSe\/FuSe.html"},{"issue":"3","key":"7_CR37","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1017\/S096012951400022X","volume":"26","author":"L Padovani","year":"2016","unstructured":"Padovani, L.: Fair subtyping for multi-party session types. Math. Struct. Comput. Sci. 26(3), 424\u2013464 (2016)","journal-title":"Math. Struct. Comput. Sci."},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Perera, R., Lange, J., Gay, S.J.: Multiparty compatibility for concurrent objects. In: PLACES 2016. EPTCS, vol. 211, pp. 73\u201382 (2016)","DOI":"10.4204\/EPTCS.211.8"},{"key":"7_CR39","unstructured":"Postel, J., Reynolds, J.: IETF RFC 959 File Transfer Protocol. https:\/\/tools.ietf.org\/html\/rfc959"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Pucella, R., Tov, J.A.: Haskell session types with (almost) no class. In: Haskell 2008, pp. 25\u201336. ACM (2008)","DOI":"10.1145\/1543134.1411290"},{"issue":"3","key":"7_CR41","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/TSC.2011.9","volume":"5","author":"G Sala\u00fcn","year":"2012","unstructured":"Sala\u00fcn, G., Bultan, T., Roohi, N.: Realizability of choreographies using process algebra encodings. IEEE Trans. Serv. Comput. 5(3), 290\u2013304 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"7_CR42","unstructured":"Scalas, A., Yoshida, N.: Lightweight session programming in scala. In: ECOOP 2016. LIPIcs, vol. 56, pp. 21:1\u201321:28. Schloss Dagstuhl (2016)"},{"key":"7_CR43","unstructured":"Scribble.: GitHub repository. https:\/\/github.com\/scribble\/scribble-java"},{"key":"7_CR44","unstructured":"Scribble homepage. http:\/\/www.scribble.org"},{"issue":"2","key":"7_CR45","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.scico.2012.03.004","volume":"78","author":"KC Sivaramakrishnan","year":"2013","unstructured":"Sivaramakrishnan, K.C., Qudeisat, M., Ziarek, L., Nagaraj, K., Eugster, P.: Efficient sessions. Sci. Comput. Program. 78(2), 147\u2013167 (2013)","journal-title":"Sci. Comput. Program."},{"key":"7_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-642-12032-9_10","volume-title":"Foundations of Software Science and Computational Structures","author":"N Yoshida","year":"2010","unstructured":"Yoshida, N., Deni\u00e9lou, P.-M., Bejleri, A., Hu, R.: Parameterised multiparty session types. In: Ong, L. (ed.) FoSSaCS 2010. LNCS, vol. 6014, pp. 128\u2013145. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-12032-9_10"},{"key":"7_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-05119-2_3","volume-title":"Trustworthy Global Computing","author":"N Yoshida","year":"2014","unstructured":"Yoshida, N., Hu, R., Neykova, R., Ng, N.: The scribble protocol language. In: Abadi, M., Lluch Lafuente, A. (eds.) TGC 2013. LNCS, vol. 8358, pp. 22\u201341. Springer, Cham (2014). doi:10.1007\/978-3-319-05119-2_3"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54494-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T02:18:48Z","timestamp":1618971528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54494-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662544938","9783662544945"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54494-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Uppsala","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 April 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.etaps.org\/index.php\/2017\/fase","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}