{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T10:04:10Z","timestamp":1648893850032},"reference-count":18,"publisher":"Elsevier BV","issue":"3-4","license":[{"start":{"date-parts":[[1979,1,1]],"date-time":"1979-01-01T00:00:00Z","timestamp":283996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages"],"published-print":{"date-parts":[[1979,1]]},"DOI":"10.1016\/0096-0551(79)90019-5","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T23:11:16Z","timestamp":1060297876000},"page":"187-198","source":"Crossref","is-referenced-by-count":1,"title":["Deep and shallow binding: The assignment operation"],"prefix":"10.1016","volume":"4","author":[{"given":"Hanan","family":"Samet","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0096-0551(79)90019-5_BIB1","first-page":"152","article-title":"Anatomy of LISP","author":"Allen","year":"1978"},{"key":"10.1016\/0096-0551(79)90019-5_BIB2","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1145\/359545.359566","article-title":"Shallow binding in LISP 1.5","volume":"21","author":"Baker","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0096-0551(79)90019-5_BIB3","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1145\/356631.356632","article-title":"New programming languages for artificial intelligence","volume":"6","author":"Bobrow","year":"1974","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0096-0551(79)90019-5_BIB4","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1145\/362375.362379","article-title":"A model and stack implementation of multiple environments","volume":"16","author":"Bobrow","year":"1973","journal-title":"Comm. ACM"},{"key":"10.1016\/0096-0551(79)90019-5_BIB5_1","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/BF01386232","article-title":"Recursive programming","volume":"2","author":"Dijkstra","year":"1960","journal-title":"Num. Math"},{"key":"10.1016\/0096-0551(79)90019-5_BIB5_2","series-title":"Programming systems and languages","article-title":"Recursive programming","author":"Dijkstra","year":"1967"},{"key":"10.1016\/0096-0551(79)90019-5_BIB6","series-title":"The LISP machine","author":"Greenblatt","year":"1977"},{"key":"10.1016\/0096-0551(79)90019-5_BIB7","series-title":"The SNOBOL4 Programming Language","author":"Griswold","year":"1971"},{"key":"10.1016\/0096-0551(79)90019-5_BIB8","series-title":"Proceedings of the Fifth International Joint Conference on Artifical Intelligence","first-page":"790","article-title":"A. retrospective view of the Hearsay-II architecture","author":"Lesser","year":"1977"},{"key":"10.1016\/0096-0551(79)90019-5_BIB9","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1145\/367177.367199","article-title":"Recursive functions of symbolic expressions and their computation by machine","volume":"3","author":"McCarthy","year":"1960","journal-title":"Comm. ACM"},{"key":"10.1016\/0096-0551(79)90019-5_BIB10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1093410.1093411","article-title":"The function of FUNCTION in LISP","volume":"15","author":"Moses","year":"1970","journal-title":"SIGSAM Bull."},{"key":"10.1016\/0096-0551(79)90019-5_BIB11","series-title":"Revised report on the algorithmic language ALGOL 60","first-page":"299","volume":"3","year":"1960"},{"key":"10.1016\/0096-0551(79)90019-5_BIB12","series-title":"Programming Languages: Design and Implementation","author":"Pratt","year":"1975"},{"key":"10.1016\/0096-0551(79)90019-5_BIB13","article-title":"Stanford LISP 1.6 manual","author":"Quam","year":"1972"},{"key":"10.1016\/0096-0551(79)90019-5_BIB14","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TSMC.1979.4310183","article-title":"Artificial intelligence programming languages for computer aided manufacturing","volume":"SMC-9","author":"Rieger","year":"1979","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"10.1016\/0096-0551(79)90019-5_BIB15","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1093420.1093422","article-title":"A proposed solution to the FUNARG problem","volume":"17","author":"Sandewall","year":"1971","journal-title":"SIGSAM Bull."},{"key":"10.1016\/0096-0551(79)90019-5_BIB16","article-title":"A shallow binding scheme for fast environment changing in a \u201cSpaghetti Stack\u201d LISP system","author":"Urmi","year":"1976"},{"key":"10.1016\/0096-0551(79)90019-5_BIB17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/0020-0190(75)90046-0","article-title":"Retrieval from context trees","volume":"3","author":"Wegbreit","year":"1975","journal-title":"Inf. Processing Lett."}],"container-title":["Computer Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0096055179900195?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0096055179900195?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T09:20:45Z","timestamp":1552641645000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0096055179900195"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1979,1]]},"references-count":18,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[1979,1]]}},"alternative-id":["0096055179900195"],"URL":"https:\/\/doi.org\/10.1016\/0096-0551(79)90019-5","relation":{},"ISSN":["0096-0551"],"issn-type":[{"value":"0096-0551","type":"print"}],"subject":[],"published":{"date-parts":[[1979,1]]}}}