{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:27:17Z","timestamp":1739338037896,"version":"3.37.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,8,1]],"date-time":"2009-08-01T00:00:00Z","timestamp":1249084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Acta Informatica"],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s00236-009-0099-2","type":"journal-article","created":{"date-parts":[[2009,8,3]],"date-time":"2009-08-03T04:52:59Z","timestamp":1249275179000},"page":"375-401","source":"Crossref","is-referenced-by-count":0,"title":["Machine structure oriented control code logic"],"prefix":"10.1007","volume":"46","author":[{"given":"J. A.","family":"Bergstra","sequence":"first","affiliation":[]},{"given":"C. A.","family":"Middelburg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,4]]},"reference":[{"key":"99_CR1","volume-title":"Principles of Compiler Design","author":"A.V. Aho","year":"1977","unstructured":"Aho A.V., Ullman J.D.: Principles of Compiler Design. Addison-Wesley, Reading (1977)"},{"issue":"2","key":"99_CR2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/857076.857077","volume":"35","author":"J. Aycock","year":"2003","unstructured":"Aycock J.: A brief history of just-in-time. ACM Comput. Surv. 35(2), 97\u2013113 (2003)","journal-title":"ACM Comput. Surv."},{"key":"99_CR3","doi-asserted-by":"crossref","unstructured":"Bergstra, J.A.: Machine function based control code algebras. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.P. (eds.) FMCO 2003, Lecture Notes in Computer Science, vol. 3188, pp. 17\u201341. Springer-Verlag (2004)","DOI":"10.1007\/978-3-540-30101-1_2"},{"key":"99_CR4","doi-asserted-by":"crossref","unstructured":"Bergstra, J.A., Bethke, I.: Polarized process algebra and program equivalence. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) Proceedings 30th ICALP, Lecture Notes in Computer Science, vol. 2719, pp. 1\u201321. Springer-Verlag (2003)","DOI":"10.1007\/3-540-45061-0_1"},{"issue":"3","key":"99_CR5","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.scico.2006.09.003","volume":"64","author":"J.A. Bergstra","year":"2006","unstructured":"Bergstra J.A., Klint P.: About \u201ctrivial\u201d software patents: the IsNot case. Sci. Comput. Program. 64(3), 264\u2013285 (2006)","journal-title":"Sci. Comput. Program."},{"issue":"2","key":"99_CR6","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/S1567-8326(02)00018-8","volume":"51","author":"J.A. Bergstra","year":"2002","unstructured":"Bergstra J.A., Loots M.E.: Program algebra for sequential code. J. Log. Algebraic Program. 51(2), 125\u2013156 (2002)","journal-title":"J. Log. Algebraic Program."},{"issue":"2\u20133","key":"99_CR7","doi-asserted-by":"crossref","first-page":"153","DOI":"10.3233\/FUN-2006-712-302","volume":"71","author":"J.A. Bergstra","year":"2006","unstructured":"Bergstra J.A., Middelburg C.A.: Thread algebra with multi-level strategies. Fundam. Inform. 71(2\u20133), 153\u2013182 (2006)","journal-title":"Fundam. Inform."},{"key":"99_CR8","unstructured":"Bergstra, J.A., Middelburg, C.A.: Machine structure oriented control code logic. Computer Science Report 07-10, Department of Mathematics and Computer Science, Eindhoven University of Technology (2007)"},{"issue":"2","key":"99_CR9","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S1567-8326(02)00020-6","volume":"51","author":"J.A. Bergstra","year":"2002","unstructured":"Bergstra J.A., Ponse A.: Combining programs and state machines. J. Log. Algebraic Program. 51(2), 175\u2013192 (2002)","journal-title":"J. Log. Algebraic Program."},{"issue":"1","key":"99_CR10","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.jal.2005.10.013","volume":"5","author":"J.A. Bergstra","year":"2007","unstructured":"Bergstra J.A., Ponse A.: Execution architectures for program algebra. J. Appl. Log. 5(1), 170\u2013192 (2007)","journal-title":"J. Appl. Log."},{"issue":"3","key":"99_CR11","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1145\/366199.366249","volume":"4","author":"H. Bratman","year":"1961","unstructured":"Bratman H.: An alternate form of the UNCOL diagram. Commun. ACM 4(3), 142 (1961)","journal-title":"Commun. ACM"},{"key":"99_CR12","first-page":"929","volume-title":"Handbook of Network and Systems Administration","author":"G. Delen","year":"2007","unstructured":"Delen G.: Decision and control factors for IT-sourcing. In: Bergstra, J.A., Burgess, M. (eds) Handbook of Network and Systems Administration, pp. 929\u2013946. Elsevier, Amsterdam (2007)"},{"issue":"10","key":"99_CR13","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1145\/355598.362740","volume":"13","author":"J. Earley","year":"1970","unstructured":"Earley J., Sturgis H.: A formalism for translator interactions. Commun. ACM 13(10), 607\u2013617 (1970)","journal-title":"Commun. ACM"},{"key":"99_CR14","volume-title":"Introduction to Process Algebra. Texts in Theoretical Computer Science, An EATCS Series","author":"W.J. Fokkink","year":"2000","unstructured":"Fokkink W.J.: Introduction to Process Algebra. Texts in Theoretical Computer Science, An EATCS Series. Springer-Verlag, Berlin (2000)"},{"key":"99_CR15","volume-title":"The Java Language Specification","author":"J. Gosling","year":"2000","unstructured":"Gosling J., Joy B., Steele G., Bracha G.: The Java Language Specification. 2nd edn. Addison-Wesley, Reading (2000)","edition":"2"},{"key":"99_CR16","volume-title":"C# Language Specification","author":"A. Hejlsberg","year":"2003","unstructured":"Hejlsberg A., Wiltamuth S., Golde P.: C# Language Specification. Addison-Wesley, Reading (2003)"},{"key":"99_CR17","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)"},{"issue":"4","key":"99_CR18","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.jal.2008.09.003","volume":"6","author":"L.E. Janlert","year":"2008","unstructured":"Janlert L.E.: Dark programming and the case for the rationality of programs. J. Appl. Log. 6(4), 545\u2013552 (2008)","journal-title":"J. Appl. Log."},{"key":"99_CR19","volume-title":"The Java Virtual Machine Specification","author":"T. Lindholm","year":"1996","unstructured":"Lindholm T., Yellin F.: The Java Virtual Machine Specification. Addison-Wesley, Reading (1996)"},{"issue":"4","key":"99_CR20","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/isre.3.4.334","volume":"3","author":"L. Loh","year":"1992","unstructured":"Loh L., Venkatraman N.: Diffusion of information technology outsourcing, influence sources and the Kodak effect. Inform. Syst. Res. 3(4), 334\u2013358 (1992)","journal-title":"Inform. Syst. Res."},{"key":"99_CR21","volume-title":"Communication and Concurrency","author":"R. Milner","year":"1989","unstructured":"Milner R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)"},{"key":"99_CR22","doi-asserted-by":"crossref","unstructured":"Poole, P.C., Waite, W.M.: Portability and adaptability. In: Bauer, F.L. (ed.) Software Engineering, An Advanced Course. Lecture Notes in Computer Science, vol. 30, pp. 183\u2013277. Springer-Verlag (1975)","DOI":"10.1007\/3-540-07168-7_78"},{"key":"99_CR23","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1002\/spe.4380080604","volume":"8","author":"A.S. Tanenbaum","year":"1978","unstructured":"Tanenbaum A.S., Klint P., Bohm W.: Guidelines for software portability. Softw. Pract. Exp. 8, 681\u2013698 (1978)","journal-title":"Softw. Pract. Exp."},{"issue":"3","key":"99_CR24","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.scico.2004.08.003","volume":"56","author":"C. Verhoef","year":"2005","unstructured":"Verhoef C.: Quantitative aspects of outsourcing deals. Sci. Comput. Program. 56(3), 275\u2013313 (2005)","journal-title":"Sci. Comput. Program."},{"key":"99_CR25","volume-title":"Programming in the .NET Environment","author":"D. Watkins","year":"2003","unstructured":"Watkins D., Hammond M., Abrams B.: Programming in the .NET Environment. Addison-Wesley, Reading (2003)"},{"key":"99_CR26","volume-title":"Theory and Techniques of Compiler Construction","author":"N. Wirth","year":"1996","unstructured":"Wirth N.: Theory and Techniques of Compiler Construction. Addison-Wesley, Reading (1996)"}],"container-title":["Acta Informatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00236-009-0099-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00236-009-0099-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00236-009-0099-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:10:32Z","timestamp":1739290232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00236-009-0099-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["99"],"URL":"https:\/\/doi.org\/10.1007\/s00236-009-0099-2","relation":{},"ISSN":["0001-5903","1432-0525"],"issn-type":[{"type":"print","value":"0001-5903"},{"type":"electronic","value":"1432-0525"}],"subject":[],"published":{"date-parts":[[2009,8]]}}}