{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T20:36:31Z","timestamp":1693859791551},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1983,3,1]],"date-time":"1983-03-01T00:00:00Z","timestamp":415324800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BIT"],"published-print":{"date-parts":[[1983,3]]},"DOI":"10.1007\/bf01937323","type":"journal-article","created":{"date-parts":[[2005,7,25]],"date-time":"2005-07-25T14:27:53Z","timestamp":1122301673000},"page":"21-35","source":"Crossref","is-referenced-by-count":2,"title":["Abstractions of control environments"],"prefix":"10.1007","volume":"23","author":[{"given":"Franco","family":"Turini","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"BF01937323_CR1","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1145\/356631.356632","volume":"6","author":"D. G. Bobrow","year":"1974","unstructured":"D. G. Bobrow and B. Raphael,New programming languages for artificial intelligence research, Computing Surveys 6, 3 (1974), 153\u2013174.","journal-title":"Computing Surveys"},{"key":"BF01937323_CR2","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1145\/361227.361230","volume":"18","author":"J. B. Goodenough","year":"1975","unstructured":"J. B. Goodenough,Exception handling: issues and proposed notation, Communications of ACM, Vol. 18 (1975), 683\u2013696.","journal-title":"Communications of ACM"},{"key":"BF01937323_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-6228-2","volume-title":"The Denotational Description of Programming Languages. An Introduction","author":"M. Gordon","year":"1979","unstructured":"M. Gordon,The Denotational Description of Programming Languages. An Introduction, Springer, New York (1979)."},{"key":"BF01937323_CR4","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1145\/359488.359502","volume":"21","author":"D. R. Hanson","year":"1978","unstructured":"D. R. Hanson and R. E. Griswold,The SL5 procedure mechanism, Communications of ACM, Vol. 21 (1978), 392\u2013400.","journal-title":"Communications of ACM"},{"key":"BF01937323_CR5","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/0004-3702(77)90033-9","volume":"8","author":"C. Hewitt","year":"1977","unstructured":"C. Hewitt,Viewing control structures as patterns of passing messages, Artificial Intelligence Journal, Vol. 8 (1977), 323\u2013364.","journal-title":"Artificial Intelligence Journal"},{"key":"BF01937323_CR6","unstructured":"C. Hewitt and H. Baker,Laws for Communicating Parallel Processes, IFIP 77 (B. Gilchrist ed.) North-Holland, 987\u2013992."},{"issue":"8","key":"BF01937323_CR7","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"C. A. R. Hoare","year":"1978","unstructured":"C. A. R. Hoare,Communicating sequential processes, Communications of ACM 21, 8 (August, 1978), 666\u2013677.","journal-title":"Communications of ACM"},{"key":"BF01937323_CR8","unstructured":"R. Levin,Program structures for exceptional conditions handling, Ph.D. Thesis, Dept. of Comput. Sci., Carnegie-Mellon Univ., Un-numbered Internal Report, June (1977)."},{"key":"BF01937323_CR9","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TSE.1979.230191","volume":"SE-5","author":"B. Liskov","year":"1979","unstructured":"B. Liskov and A. Snyder,Exception handling in CLU, IEEE Transactions on Software Engineering, Vol. SE-5 (1979), 546\u2013558.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"BF01937323_CR10","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1145\/359763.359789","volume":"21","author":"B. Liskov","year":"1977","unstructured":"B. Liskov, A. Snyder, R. Atkinson and C. Shaffert,Abstraction mechanisms in CLU, Communications of ACM 21 (1977), 564\u2013576.","journal-title":"Communications of ACM"},{"key":"BF01937323_CR11","unstructured":"C. Montangero, G. Pacini and F. Turini,Magmalisp: a machine language for artificial intelligence, Proc. 4th Int. Joint Conf. Artificial Intel., Tiblisi (1975), 556\u2013561."},{"key":"BF01937323_CR12","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/390017.808307","volume":"12","author":"G. J. Popek","year":"1977","unstructured":"G. J. Popek, J. J. Horning, B. W. Lampson, J. G. Mitchell and R. L. London,Note on the design of EUCLID, Sigplan Notices 12 (1977), 11\u201318.","journal-title":"Sigplan Notices"},{"key":"BF01937323_CR13","unstructured":"M. Shaw,The impact of abstraction concerns on modern programming languages, Tech. Rept. CMU-CS-80-116, Carnegie-Mellon Univ., April (1980)."},{"key":"BF01937323_CR14","doi-asserted-by":"crossref","unstructured":"S. A. Shuman, ed.,Proceedings of the international symposium on extensible languages, ACM SIGPLAN NOTICES 6, (December, 1971).","DOI":"10.1145\/942582.807986"},{"key":"BF01937323_CR15","unstructured":"F. Turini,Magma2: a language oriented to experiments in control, IBM Research Report RJ2758, (February 1980)."},{"key":"BF01937323_CR16","unstructured":"F. Turini,Denotational models of control environments, in preparation."},{"key":"BF01937323_CR17","first-page":"1","volume":"14\u201312","author":"P. Wegner","year":"1979","unstructured":"P. Wegner,Programming with ADA: an introduction by means of graduate examples, SIGPLAN Notices 14\u201312, (December 1979), 1\u201347.","journal-title":"SIGPLAN Notices"},{"key":"BF01937323_CR18","first-page":"252","volume":"SE-2","author":"W. A. Wulf","year":"1976","unstructured":"W. A. Wulf, R. L. London and M. Shaw,An introduction to the construction and verification of alphard programs, IEEE Transactions on Software Engineering SE-2 (1976), 252\u2013256.","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["BIT"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01937323.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01937323\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01937323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T10:07:31Z","timestamp":1586340451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01937323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983,3]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1983,3]]}},"alternative-id":["BF01937323"],"URL":"https:\/\/doi.org\/10.1007\/bf01937323","relation":{},"ISSN":["0006-3835","1572-9125"],"issn-type":[{"value":"0006-3835","type":"print"},{"value":"1572-9125","type":"electronic"}],"subject":[],"published":{"date-parts":[[1983,3]]}}}