{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T18:04:12Z","timestamp":1759341852307},"reference-count":7,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1992,7,1]],"date-time":"1992-07-01T00:00:00Z","timestamp":709948800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages"],"published-print":{"date-parts":[[1992,7]]},"DOI":"10.1016\/0096-0551(92)90026-j","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T23:04:53Z","timestamp":1060297493000},"page":"157-167","source":"Crossref","is-referenced-by-count":2,"title":["Inheritance of theory in the ADABTPL language"],"prefix":"10.1016","volume":"17","author":[{"given":"Tim","family":"Sheard","sequence":"first","affiliation":[]},{"given":"David","family":"Stemple","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0096-0551(92)90026-J_BIB1","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1145\/6041.6042","article-title":"On understanding types, data abstraction, and polymorphism","volume":"17","author":"Cardelli","year":"1985","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/0096-0551(92)90026-J_BIB2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/BF00976239","article-title":"Recursive data structures","volume":"4","author":"Hoare","year":"1975","journal-title":"Int. J. Comput. Inform. Sci."},{"key":"10.1016\/0096-0551(92)90026-J_BIB3","series-title":"A Computational Logic","author":"Boyer","year":"1979"},{"key":"10.1016\/0096-0551(92)90026-J_BIB4","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/68012.68014","article-title":"Automatic verification of database transaction safety","volume":"14","author":"Sheard","year":"1989","journal-title":"ACM Trans. Database Syst."},{"key":"10.1016\/0096-0551(92)90026-J_BIB5","article-title":"Functional Programming Using Standard ML","author":"Witstrom","year":"1987"},{"key":"10.1016\/0096-0551(92)90026-J_BIB6","article-title":"The Implementation of Functional Programming Languages","author":"Peyton Jones","year":"1987"},{"key":"10.1016\/0096-0551(92)90026-J_BIB7","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/321992.321996","article-title":"A transformation system for developing recursive programs","volume":"24","author":"Burstall","year":"1977","journal-title":"J. Ass. Comput. Mach."}],"container-title":["Computer Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:009605519290026J?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:009605519290026J?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T07:25:38Z","timestamp":1552634738000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/009605519290026J"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,7]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1992,7]]}},"alternative-id":["009605519290026J"],"URL":"https:\/\/doi.org\/10.1016\/0096-0551(92)90026-j","relation":{},"ISSN":["0096-0551"],"issn-type":[{"value":"0096-0551","type":"print"}],"subject":[],"published":{"date-parts":[[1992,7]]}}}