{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:21:56Z","timestamp":1725456116527},"publisher-location":"Berlin\/Heidelberg","reference-count":46,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"354010027X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/bfb0022497","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T05:49:12Z","timestamp":1132724952000},"page":"94-112","source":"Crossref","is-referenced-by-count":4,"title":["Abstract data types: A retrospective and prospective view"],"prefix":"10.1007","author":[{"given":"Wm. A.","family":"Wulf","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Allen L. Ambler, Donald I. Good, James C. Browne, Wilhelm F. Burger, Richard M. Cohen, Charles G. Hoch, Robert E. Wells. \u201cGypsy: A Language for Specification and Implementation of Verifiable Programs.\u201d ACM SIGPLAN Notices 12, 3 (March 1977).","DOI":"10.1145\/390017.808306"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Per Brinch Hansen. \u201cThe Programming Language Concurrent Pascal.\u201d IEEE Transactions on Software Engineering SE-1 (June 1975).","DOI":"10.1109\/TSE.1975.6312840"},{"key":"6_CR3","unstructured":"J. N. Buxton and B. Randell (eds). Software Engineering Techniques. NATO, 1970. Report on a Conference Sponsored by the NATO Science Committee, Rome, Italy, 27th to 31st October 1969"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"R. H. Campbell and A. N. Habermann. The Specification of Process Synchronization by Path Expressions. Lecture Notes in Computer Science 16, 1974.","DOI":"10.1007\/BFb0029355"},{"key":"6_CR5","volume-title":"Simula 67 Common Base Language","author":"O.-J. Dahl","year":"1968","unstructured":"O.-J. Dahl. Simula 67 Common Base Language. Norwegian Computing Center, Oslo, 1968."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Edsger W. Dijkstra. \u201cGoto Statement Considered Harmful.\u201d Communications of the ACM 11, 3 (March 1968).","DOI":"10.1145\/362929.362947"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Edsger W. Dijkstra. \u201cThe Structure of the \u2018THE\u2019 Multiprogramming System.\u201d Communications of the ACM 11, 3 (May 1968).","DOI":"10.1145\/363095.363143"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"R. W. Floyd. Assigning Meanings to Programs. Proceedings of the Symposium in Applied Mathematics, American Mathematical Society, 1967, pp. 19\u201332.","DOI":"10.1090\/psapm\/019\/0235771"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Charles M. Geschke, James H. Morris Jr., and Edwin H. Satterthwaite. \u201cEarly Experience with Mesa.\u201d Communications of the ACM 20, 8 (August 1977).","DOI":"10.1145\/359763.359771"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"John V. Guttag, Ellis Horowitz and David R. Musser. \u201cAbstract Data Types and Software Validation.\u201d Communications of the ACM 21, 12 (December 1978).","DOI":"10.1145\/359657.359666"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"C. A. R. Hoare. \u201cProof of Correctness of Data Representations.\u201d Acta Informatica 1, 4 (1972).","DOI":"10.1007\/BF00289507"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"C. A. R. Hoare and N. Wirth. \u201cAn Axiomatic Definition of the Programming Language Pascal.\u201d Acta Informatica 2, 4 (1973).","DOI":"10.1007\/BF00289504"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"J. D. Ichbiah, et al. \u201cPreliminary ADA Reference Manual.\u201d ACM SIGPLAN Notices 14, 6A (June 1979).","DOI":"10.1145\/956650.956651"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Kathleen Jensen and Niklaus Wirth. Pascal User Manual and Report. Springer-Verlag, 1974.","DOI":"10.1007\/978-3-662-21554-8"},{"issue":"4","key":"6_CR15","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/TSE.1976.233833","volume":"SE-2","author":"A. K. Jones","year":"1976","unstructured":"A. K. Jones and B. H. Liskov. \u201cA Language Extension for Controlling Access to Shared Data.\u201d IEEE Transactions on Software Engineering SE-2, 4 (December 1976), 277\u2013285.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"B. W. Lampson, J. J. Horning, R. L. London, J. G. Mitchell and G. J. Popek. \u201cReport on the Programming Language Euclid.\u201d ACM SIGPLAN Notices 12, 2 (February 1977).","DOI":"10.1145\/954666.971189"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Barbara H. Liskov and Stephen N. Zilles. \u201cSpecification Techniques for Data Abstractions.\u201d IEEE Transactions on Software Engineering SE-1 (March 1975).","DOI":"10.1145\/800027.808426"},{"key":"6_CR18","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/359763.359789","volume":"20","author":"B. Liskov","year":"1977","unstructured":"Barbara Liskov, Alan Snyder, Russell Atkinson and Craig Schaffert. \u201cAbstraction Mechanisms in CLU.\u201d Communications of the ACM 20, 8 (August 1977).","journal-title":"Communications of the ACM"},{"key":"6_CR19","unstructured":"B. Liskov, E. Moss, C. Schaffert, R. Scheifler and A. Snyder. The CLU Reference Manual. Laboratory for Computer Science, Massachusetts Institute of Technology, 1978. Computation Structures Group Memo No. 161."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"R. L. London. A View of Program Verification. Proceedings of the International Conference on Reliable Software, April, 1975, pp. 534\u2013545.","DOI":"10.1145\/800027.808477"},{"issue":"1","key":"6_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF00260921","volume":"10","author":"R. L. London","year":"1978","unstructured":"R. L. London, J. V. Guttag, J. J. Horning, B. W. Lampson, J. G. Mitchell, and G.J. Popek. \u201cProof Rules for the Programming Language Euclid.\u201d Acta Informatica 10, 1 (1978), 1\u201326.","journal-title":"Acta Informatica"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"J. H. Morris. Types Are Not Sets. Proceedings of the ACM Symposium on Principles of Programming Languages, ACM, 1973, pp. 120\u2013124","DOI":"10.1145\/512927.512938"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"J. H. Morris. \u201cProtection in Programming Languages.\u201d Communications of the ACM 16 (January 1973).","DOI":"10.1145\/361932.361937"},{"key":"6_CR24","unstructured":"Peter Naur and Brian Randell (eds). Software Engineering. NATO, 1969. Report on a Conference Sponsored by the NATO Science Committee, Garmisch, Germany, 7th to 11th October 1968"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"J. Nestor and M. Van Deusen. RED Language Reference Manual. Intermetrics, Inc., 1979.","DOI":"10.21236\/ADA219453"},{"key":"6_CR26","unstructured":"Peter G. Neumann, Robert S. Boyer, Richard J. Feiertag, Karl N. Levitt and Lawrence Robinson. A Provably Secure Operating System: The System, its Applications, and Proofs. Tech. Rept. 4332 Final Report, SRI International Project, February, 1977."},{"key":"6_CR27","unstructured":"David L. Parnas. Information Distribution Aspects of Design Methodology. Proceedings of IFIP Congress, IFIP, 1971, pp. 26\u201330. Booklet TA-3."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"David L. Parnas. \u201cOn the Criteria to be Used in Decomposing Systems into Modules.\u201d Communications of the ACM 15, 12 (December 1972).","DOI":"10.1145\/361598.361623"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"David L. Parnas. \u201cA Technique for Software Module Specification with Examples.\u201d Communications of the ACM 15 (May 1972).","DOI":"10.1145\/355602.361309"},{"key":"6_CR30","unstructured":"D. L. Parnas, J. E. Shore and Elliott. On the Need for Fewer Restrictions in Changing Compile-time Environments. NRL Report 7847, Naval Research Lab, November, 1974."},{"key":"6_CR31","unstructured":"David L. Parnas. Some Hypotheses about the \u201cUses\u201d Hierarchy for Operating Systems. Technische Hochschule Darmstadteich Informatik, 1976."},{"key":"6_CR32","unstructured":"David Parnas. On a Buzzword, Hierarchical Structure. Proceedings of the IFIP Congress, August, 1974."},{"key":"6_CR33","unstructured":"O. Roubine and L. Robinson. Special (SPECIfications and Assertion Language): Reference Manual. SRI International Memo, 1976."},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"S. A. Schuman, Ed. \u201cProceedings of the International Symposium on Extensible Languages.\u201d ACM SIGPLAN Notices 6 (December 1971).","DOI":"10.1145\/942582.807993"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Mary Shaw, Wm. A. Wulf and Ralph L. London. \u201cAbstraction and Verification in Alphard: Defining and Specifying Iteration and Generators.\u201d Communications of the ACM 20, 8 (August 1977).","DOI":"10.1145\/359763.359782"},{"key":"6_CR36","unstructured":"Mary Shaw. A Formal System for Specifying and Verifying Program Performance. Tech. Rept. CMU-CS-79-129, Carnegie-Mellon University, June, 1979."},{"issue":"3","key":"6_CR37","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/947626.947629","volume":"13","author":"M. Shaw","year":"1980","unstructured":"Mary Shaw and Wm. A. Wulf. \u201cToward Relaxing Assumptions in Languages and Their Implementations.\u201d SIGPLAN Notices 13, 3 (March 1980), 45\u201361.","journal-title":"SIGPLAN Notices"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"J. Spitzen and B. Wegbreit. \u201cThe verification and synthesis of data structures.\u201d Acta Informatica 4 (1975).","DOI":"10.1007\/BF00288745"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Bruce J. Walker, Richard A. Kemmerer, and Gerald J. Popek. \u201cSpecification and Verification of the UCLA Security Kernel.\u201d Communications of the ACM 23, 2 (February 1980).","DOI":"10.1145\/358818.358825"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Ben Wegbreit. \u201cVerifying Program Performance.\u201d Journal of the ACM 23, 4 (October 1976).","DOI":"10.1145\/321978.321987"},{"issue":"10","key":"6_CR41","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/PROC.1978.11114","volume":"66","author":"J. H. Wensley","year":"1978","unstructured":"John H. Wensley, Leslie Lamport, Milton W. Green, Karl N. Levitt, P. M. Melliar-Smith, Robert E. Shostak, and Charles B. Weinstock. \u201cSIFT: Design and Analysis of a Fault-tolerant Computer for Aircraft Control.\u201d Proceedings of the IEEE 66, 10 (October 1978), 1240\u20131255.","journal-title":"Proceedings of the IEEE"},{"key":"6_CR42","volume-title":"Language, Thought, and Reality","author":"B. L. Whorf","year":"1956","unstructured":"B. L. Whorf. A linguistic consideration of thinking in primitive communities. In Language, Thought, and Reality, MIT Press, Cambridge, Massachusetts, 1956."},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Niklaus Wirth. \u201cProgram Development by Stepwise Refinement.\u201d Communications of the ACM 14, 4 (April 1971).","DOI":"10.1145\/362575.362577"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Niklaus Wirth. \u201cModula: A Language for Modular Programming.\u201d Software \u2014 Practice and Experience 7, 1 (January 1977).","DOI":"10.1002\/spe.4380070102"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson and F. Rollack. \u201cHydra: The Kernel of a Multiprocessor Operating System.\u201d Communications of the ACM 17 (June 1974).","DOI":"10.1145\/355616.364017"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Wm. A. Wulf, Ralph L. London and Mary Shaw. \u201cAn Introduction to the Construction and Verification of Alphard Programs.\u201d IEEE Transactions on Software Engineering SE-2, 4 (December 1976).","DOI":"10.1109\/TSE.1976.233830"}],"container-title":["Lecture Notes in Computer Science","Mathematical Foundations of Computer Science 1980"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/BFb0022497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T04:21:22Z","timestamp":1586578882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0022497"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["354010027X"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/bfb0022497","relation":{},"subject":[]}}