{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:24:12Z","timestamp":1725456252279},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540612858"},{"type":"electronic","value":"9783540684343"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/bfb0030519","type":"book-chapter","created":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T01:11:16Z","timestamp":1133399476000},"page":"49-63","source":"Crossref","is-referenced-by-count":1,"title":["Regularities in software systems"],"prefix":"10.1007","author":[{"given":"Naftaly H.","family":"Minsky","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Frederick P. Jr. Brooks. No silver bullet \u2014 the essence and accidents of software engineering. IEEE Computer, pages 10\u201319, April 1987.","DOI":"10.1109\/MC.1987.1663532"},{"key":"5_CR2","unstructured":"L. Cardelli, J. Dinahue, L. Glassman, M. Kalsow Jordan, B., and G. Nelson. Modula-3 report (revised). Technical Report 52, Digital System Research Center, November 1989."},{"key":"5_CR3","unstructured":"W.F. Clocksin and C.S. Mellish. Programming in Prolog. Springer-Verlag, 1981."},{"issue":"4","key":"5_CR4","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1145\/356678.356680","volume":"8","author":"P.J. Denning","year":"1976","unstructured":"P.J. Denning. Fault tolerant operating systems. Computing Surveys, 8(4):359\u2013389, December 1976.","journal-title":"Computing Surveys"},{"issue":"8","key":"5_CR5","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M. A. Harrison","year":"1976","unstructured":"M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461\u2013471, Aug. 1976.","journal-title":"Communications of the ACM"},{"key":"5_CR6","unstructured":"J. Leichter and N.H. Minsky. Obligations in law-governed distributed systems. Technical report, Rutgers University, LCSR, 1993. (In preperation)."},{"key":"5_CR7","unstructured":"B. Meyer. Object-Oriented Software Construction. Prentice-Hall, 1987."},{"issue":"4","key":"5_CR8","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1145\/1780.1786","volume":"6","author":"N.H. Minsky","year":"1984","unstructured":"N.H. Minsky. Selective and locally controlled transport of privileges. ACM Transactions on Programming Languages and Systems (TOPLAS), 6(4):573\u2013602, October 1984.","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"N.H. Minsky. Governing distributed systems: From protocols to laws. In Proceedings of the Hawaii International Conference on System Sciences, January 1991.","DOI":"10.1109\/HICSS.1991.184004"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"N.H. Minsky. The imposition of protocols over open distributed systems. IEEE Transactions on Software Engineering, February 1991.","DOI":"10.1109\/32.67599"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"N.H. Minsky. Law-governed systems. The IEE Software Engineering Journal, September 1991.","DOI":"10.1049\/sej.1991.0031"},{"key":"5_CR12","unstructured":"N.H. Minsky. Regularities in software systems. Technical Report LCSR-TR-204, Rutgers University, LCSR, April 1993."},{"key":"5_CR13","unstructured":"N.H. Minsky. Law-governed regularities in software systems. Technical Report LCSR-TR-220, Rutgers University, LCSR, January 1994."},{"key":"5_CR14","unstructured":"N.H. Minsky and P Pal. Establishing regularity in object-oriented (eiffel) systems. Technical Report LCSR-TR-227, Rutgers University, LCSR, June 1994. (Presented at the ECOOP Workshop on Patterns on OO programming, Bologna, July 1994)."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"N.H. Minsky and D. Rozenshtein. Law-based approach to object-oriented programming. In Proceedings of the OOPSLA '87 Conference, pages 482\u2013493, October 1987.","DOI":"10.1145\/38765.38851"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"N.H. Minsky and D Rozenshtein. Controllable delegation: An exercise in law-governed systems. In Proceedings of the OOPSLA '89 Conference, pages 371\u2013380, October 1989.","DOI":"10.1145\/74877.74916"},{"key":"5_CR17","unstructured":"N.H. Minsky and D. Rozenshtein. Specifications of the darwin\/2 environment. Technical report, Rutgers University, LCSR, 1991."},{"key":"5_CR18","unstructured":"W. Morris. The American Heritage Dictionary of the English Language. Houghton Mifflin Company, 1981."},{"issue":"4","key":"5_CR19","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MS.1987.231801","volume":"6","author":"S.P. Reiss","year":"1987","unstructured":"S.P. Reiss. Working on the garden environment for conceptual programming. IEEE Software, 6(4):16\u201327, November 1987.","journal-title":"IEEE Software"},{"key":"5_CR20","unstructured":"D. Rozenshtein and N.H. Minsky. Constraining interactions between objects in the presence of class inheritance. In Proceedings of the 2nd International Workshop on Computer-Aided Software Engineering, July 1988."},{"issue":"6","key":"5_CR21","first-page":"14","volume":"1","author":"D. Rozenshtein","year":"1989","unstructured":"D. Rozenshtein and N.H. Minsky. Law-governed object-oriented system. Journal of Object-Oriented Programming, 1(6): 14\u201329, March\/April 1989.","journal-title":"Journal of Object-Oriented Programming"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"R.E. Strom. Mechanism for compile-time enforcement of security. In Proceedings of the ACM Symposium on Principles of Programming Languages, pages 276\u2013284, January 1983.","DOI":"10.1145\/567067.567093"},{"key":"5_CR23","unstructured":"E. P. Wigner. Symmetries and Reflections. Ox Bow Press, 1979."}],"container-title":["Lecture Notes in Computer Science","Studies of Software Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0030519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T04:20:55Z","timestamp":1586578855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0030519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540612858","9783540684343"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/bfb0030519","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}