{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T20:26:26Z","timestamp":1672345586206},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2007,7,26]],"date-time":"2007-07-26T00:00:00Z","timestamp":1185408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"},{"start":{"date-parts":[[2007,7,26]],"date-time":"2007-07-26T00:00:00Z","timestamp":1185408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Theory Comput Syst"],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1007\/s00224-007-9034-5","type":"journal-article","created":{"date-parts":[[2007,7,25]],"date-time":"2007-07-25T19:13:15Z","timestamp":1185390795000},"page":"563-582","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Risk Assessment for One-Counter Threads"],"prefix":"10.1007","volume":"43","author":[{"given":"Alban","family":"Ponse","sequence":"first","affiliation":[]},{"given":"Mark B.","family":"van der Zwaag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,7,26]]},"reference":[{"key":"9034_CR1","series-title":"Lecture Notes in Comput. Sci.","first-page":"1","volume-title":"Proceedings of ICALP 2003","author":"J.A. Bergstra","year":"2003","unstructured":"Bergstra, J.A., Bethke, I.: Polarized process algebra and program equivalence. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) Proceedings of ICALP 2003. Lecture Notes in Comput. Sci., vol. 2719, pp. 1\u201321. Springer, New York (2003)"},{"issue":"3","key":"9034_CR2","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.tcs.2005.06.014","volume":"343","author":"J.A. Bergstra","year":"2005","unstructured":"Bergstra, J.A., Bethke, I.: Polarized process algebra with reactive composition. Theor. Comput. Sci. 343(3), 285\u2013304 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"1\u20133","key":"9034_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0019-9958(84)80025-X","volume":"60","author":"J.A. Bergstra","year":"1984","unstructured":"Bergstra, J.A., Klop, J.W.: Process algebra for synchronous communication. Inf. Control 60(1\u20133), 109\u2013137 (1984)","journal-title":"Inf. Control"},{"issue":"2","key":"9034_CR4","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1567-8326(02)00020-6","volume":"51","author":"J.A. Bergstra","year":"2002","unstructured":"Bergstra, J.A., Ponse, A.: Combining programs and state machines. J. Log. Algebr. Program. 51(2), 175\u2013192 (2002)","journal-title":"J. Log. Algebr. Program."},{"key":"9034_CR5","series-title":"Lecture Notes in Comput. Sci.","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1007\/11508380_112","volume-title":"Advances in Grid Computing\u2014EGC 2005","author":"J.A. Bergstra","year":"2005","unstructured":"Bergstra, J.A., Ponse, A.: A bypass of Cohen\u2019s impossibility result. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A. (eds.) Advances in Grid Computing\u2014EGC 2005. Lecture Notes in Comput. Sci., vol. 3470, pp. 1097\u20131106. Springer, New York (2005)"},{"issue":"2","key":"9034_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s00236-007-0040-5","volume":"44","author":"J.A. Bergstra","year":"2007","unstructured":"Bergstra, J.A., Bethke, I., Ponse, A.: Decision problems for pushdown threads. Acta Inf. 44(2), 75\u201390 (2007)","journal-title":"Acta Inf."},{"key":"9034_CR7","unstructured":"Bergstra, J.A., Bethke, I., Ponse, A.: Thread algebra and risk assessment services. In: Dimitracopoulos, C., et al. (eds.) Logic Colloquium \u201905: Proceedings of the Annual European Summer Meeting of the Association for Symbolic Logic, Athens, Greece, July 28\u2013August 3, 2005. ASL Lecture Notes in Logic, vol. 28 (to appear)"},{"issue":"1","key":"9034_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1984","unstructured":"Cohen, F.: Computer viruses\u2014theory and experiments. Comput. Secur. 6(1), 22\u201335 (1984). Available as http:\/\/vx.netlux.org\/lib\/afc01.html","journal-title":"Comput. Secur."},{"issue":"1\u20132","key":"9034_CR9","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/S0019-9958(82)91250-5","volume":"54","author":"J.W. de Bakker","year":"1982","unstructured":"de Bakker, J.W., Zucker, J.I.: Processes and the denotational semantics of concurrency. Inf. Control 54(1\u20132), 70\u2013120 (1982)","journal-title":"Inf. Control"},{"key":"9034_CR10","series-title":"Lecture Notes in Comput. Sci.","first-page":"398","volume-title":"Proceedings of SOFSEM\u201999: The 26th Seminar on Current Trends in Theory and Practice of Informatics","author":"P. Jan\u010dar","year":"1999","unstructured":"Jan\u010dar, P., Moller, F., Sawa, Z.: Simulation problems for one-counter machines. In: Proceedings of SOFSEM\u201999: The 26th Seminar on Current Trends in Theory and Practice of Informatics. Lecture Notes in Comput. Sci., vol. 1725, pp. 398\u2013407. Springer, New York (1999)"},{"issue":"3","key":"9034_CR11","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/S0022-0000(75)80005-5","volume":"10","author":"M.S. Paterson","year":"1975","unstructured":"Paterson, M.S., Valiant, L.G.: Deterministic one-counter automata. J. Comput. Syst. Sci. 10(3), 340\u2013350 (1975)","journal-title":"J. Comput. Syst. Sci."},{"key":"9034_CR12","series-title":"Lecture Notes in Comput. Sci.","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11780342_46","volume-title":"Logical Approaches to Computational Barriers: Proceedings CiE 2006","author":"A. Ponse","year":"2006","unstructured":"Ponse, A., van der Zwaag, M.B.: An introduction to program and thread algebra. In: Beckmann, A. (ed.) Logical Approaches to Computational Barriers: Proceedings CiE 2006. Lecture Notes in Comput. Sci., vol. 3988, pp. 445\u2013458. Springer, New York (2006)"},{"issue":"5","key":"9034_CR13","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1137\/0216052","volume":"16","author":"L.E. Rosier","year":"1987","unstructured":"Rosier, L.E., Yen, H.-C.: Logspace hierarchies, polynomial time and the complexity of fairness problems concerning \u03c9-machines. SIAM J. Comput. 16(5), 779\u2013807 (1987)","journal-title":"SIAM J. Comput."},{"key":"9034_CR14","unstructured":"Vu, T.D.: Metric denotational semantics for BPPA. Report PRG0503, Programming Research Group, University of Amsterdam (2005). To appear in J. Log. Algebr. Program."},{"issue":"4","key":"9034_CR15","first-page":"387","volume":"70","author":"H.-C. Yen","year":"2006","unstructured":"Yen, H.-C., Yu, L.-P.: Decidability analysis of self-stabilization for infinite state systems. Fundam. Inf. 70(4), 387\u2013402 (2006)","journal-title":"Fundam. Inf."}],"container-title":["Theory of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-007-9034-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00224-007-9034-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-007-9034-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-007-9034-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T19:02:41Z","timestamp":1630436561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00224-007-9034-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7,26]]},"references-count":15,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2008,12]]}},"alternative-id":["9034"],"URL":"https:\/\/doi.org\/10.1007\/s00224-007-9034-5","relation":{},"ISSN":["1432-4350","1433-0490"],"issn-type":[{"value":"1432-4350","type":"print"},{"value":"1433-0490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,7,26]]},"assertion":[{"value":"26 July 2007","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}