{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T23:33:49Z","timestamp":1676072029979},"reference-count":60,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessors and Microsystems"],"published-print":{"date-parts":[[1993,1]]},"DOI":"10.1016\/0141-9331(93)90047-b","type":"journal-article","created":{"date-parts":[[2003,3,15]],"date-time":"2003-03-15T01:33:26Z","timestamp":1047692006000},"page":"173-181","source":"Crossref","is-referenced-by-count":3,"title":["Mechanisms for controlling evolution in persistent object systems"],"prefix":"10.1016","volume":"17","author":[{"given":"R","family":"Morrison","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"RCH","family":"Connor","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"QI","family":"Cutts","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"GNC","family":"Kirby","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"D","family":"Stemple","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"78","reference":[{"issue":"No 4","key":"10.1016\/0141-9331(93)90047-B_BIB1","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1093\/comjnl\/26.4.360","article-title":"An approach to persistent programming","volume":"Vol 26","author":"Atkinson","year":"1983","journal-title":"Comput. J."},{"key":"10.1016\/0141-9331(93)90047-B_BIB2_1","series-title":"Proc. of the Appin Workshop on Data Types and Persistence","first-page":"1","article-title":"Types, bindings and parameters in a persistent environment","author":"Atkinson","year":"1985"},{"key":"10.1016\/0141-9331(93)90047-B_BIB2_2","series-title":"Data Types and Persistence","first-page":"3","year":"1988"},{"key":"10.1016\/0141-9331(93)90047-B_BIB3_1","series-title":"International Workshop on Computer Architectures to Support Security and Persistence of Information","article-title":"Persistent languages and architectures","author":"Morrison","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB3_2","series-title":"Security and Persistence","first-page":"9","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB4_1","series-title":"2nd International Workshop on Database Programming Languages","first-page":"203","article-title":"A framework for comparing type systems for database programming languages","author":"Albano","year":"1989"},{"key":"10.1016\/0141-9331(93)90047-B_BIB4_2","unstructured":"In Hull, R, Morrison, R and Stemple, D (Eds)Database Programming Languages Morgan Kaufmann Publishers Inc., Palo Alto, CA, USA pp 170\u2013178"},{"key":"10.1016\/0141-9331(93)90047-B_BIB5","series-title":"19th International Conference on System Sciences","first-page":"842","article-title":"Integrated persistent programming systems","author":"Atkinson","year":"1986"},{"key":"10.1016\/0141-9331(93)90047-B_BIB6","first-page":"48","article-title":"Protection in persistent object systems","author":"Morrison","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB7","first-page":"269","article-title":"Exceeding the limits of polymorphism in database programming languages","volume":"416","author":"Stemple","year":"1990"},{"issue":"No 5","key":"10.1016\/0141-9331(93)90047-B_BIB8","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1145\/359488.359493","article-title":"A language extension for expressing constraints on data access","volume":"Vol 21","author":"Jones","year":"1978","journal-title":"Comm. ACM"},{"issue":"No 1","key":"10.1016\/0141-9331(93)90047-B_BIB9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/comjnl\/29.1.1","article-title":"A password-capability system","volume":"Vol 29","author":"Anderson","year":"1986","journal-title":"Comput J."},{"key":"10.1016\/0141-9331(93)90047-B_BIB10","series-title":"Proceedings of 18th Annual Hawaii International Conference on System Sciences","first-page":"222","article-title":"A capability-based workstation to support software engineering","author":"Rosenberg","year":"1985"},{"key":"10.1016\/0141-9331(93)90047-B_BIB11","series-title":"International Conference on Extending Database Technology","first-page":"301","article-title":"Existentially quantified types as a database viewing mechanism","volume":"416","author":"Connor","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB12","series-title":"Proc. Appin Workshop on Data Types and Persistence","first-page":"31","article-title":"Persistence and type abstraction","author":"Cardelli","year":"1988"},{"key":"10.1016\/0141-9331(93)90047-B_BIB13_1","series-title":"4th International Workshop on Persistent Object Systems","first-page":"137","article-title":"Persistence and type abstraction revisited","author":"Ohori","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB13_2","series-title":"Implementing Persistent Object Bases: Principles and Practice","first-page":"141","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB14_1","series-title":"4th International Workshop on Persistent Object Systems","first-page":"151","article-title":"Type equivalence checking in persistent object stores","author":"Connor","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB14_2","series-title":"Implementing Persistent Object Bases: Principles and Practice","first-page":"154","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB15","series-title":"CSR-157-83","article-title":"A proposal for standard ML","author":"Milner","year":"1983"},{"key":"10.1016\/0141-9331(93)90047-B_BIB16","first-page":"114","article-title":"CLU reference manual","author":"Liskov","year":"1981"},{"key":"10.1016\/0141-9331(93)90047-B_BIB17","article-title":"Revised report on Russell","author":"Demers","year":"1979"},{"key":"10.1016\/0141-9331(93)90047-B_BIB18","doi-asserted-by":"crossref","DOI":"10.1145\/988364.988371","article-title":"Poly manual","author":"Matthews","year":"1985"},{"key":"10.1016\/0141-9331(93)90047-B_BIB19","series-title":"ACM Lisp Conference","first-page":"136","article-title":"Hope: an experimental applicative language","author":"Burstall","year":"1980"},{"key":"10.1016\/0141-9331(93)90047-B_BIB20","article-title":"Ponder and its type system","volume":"31","author":"Fairbairn","year":"1982"},{"key":"10.1016\/0141-9331(93)90047-B_BIB21","series-title":"Miranda System Manual","author":"Turner","year":"1987"},{"issue":"No 3","key":"10.1016\/0141-9331(93)90047-B_BIB22","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1145\/44501.45065","article-title":"Abstract types have existential type","volume":"Vol 10","author":"Mitchell","year":"1988","journal-title":"ACM TOPLAS"},{"key":"10.1016\/0141-9331(93)90047-B_BIB23","first-page":"342","article-title":"An ad hoc approach to the implementation of polymorphism","author":"Morrison","year":"1991"},{"key":"10.1016\/0141-9331(93)90047-B_BIB24","article-title":"Types and polymorphism in persistent programming systems","author":"Connor","year":"1990","journal-title":"PhD Thesis"},{"key":"10.1016\/0141-9331(93)90047-B_BIB26","first-page":"51","article-title":"A semantics of multiple inheritance","volume":"173","author":"Cardelli","year":"1984"},{"key":"10.1016\/0141-9331(93)90047-B_BIB27","series-title":"Conference on Object Oriented Programming: Systems, Languages and Applications","first-page":"279","article-title":"An object addressing mechanism for statically typed languages with multiple inheritance","author":"Connor","year":"1989"},{"key":"10.1016\/0141-9331(93)90047-B_BIB28","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/872728.806864","article-title":"Type hierarchies and semantic data models","volume":"83","author":"Albano","year":"1983","journal-title":"ACM SIGPLAN"},{"key":"10.1016\/0141-9331(93)90047-B_BIB29_1","series-title":"3rd International Workshop on Database Programming Languages","first-page":"305","article-title":"Subtyping and assignment in database programming languages","author":"Connor","year":"1991"},{"key":"10.1016\/0141-9331(93)90047-B_BIB29_2","series-title":"Database Programming Languages: Bulk Types & Persistent Data","first-page":"363","year":"1992"},{"key":"10.1016\/0141-9331(93)90047-B_BIB30","first-page":"209","article-title":"Subtyping with Tears","volume":"15","author":"Connor","year":"1992"},{"key":"10.1016\/0141-9331(93)90047-B_BIB31","series-title":"Proc. Fifth International Computer Software and Applications Conference","first-page":"90","article-title":"A simplification algorithm for integrity assertions and concrete views","author":"Bernstein","year":"1981"},{"key":"10.1016\/0141-9331(93)90047-B_BIB32","series-title":"Proc. Sixth International Conference on Very Large Databases","first-page":"126","article-title":"Fast maintenance of semantic assertions using redundant aggregate data","author":"Bernstein","year":"1980"},{"key":"10.1016\/0141-9331(93)90047-B_BIB33","series-title":"Proc. ACM-SIGMOD International Conference on Management of Data","first-page":"152","article-title":"Integrity checking for multiple updates","author":"Hsu","year":"1985"},{"issue":"No 1","key":"10.1016\/0141-9331(93)90047-B_BIB34","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/58562.59302","article-title":"Maintaining state constraints in relational databases","volume":"Vol 36","author":"McCune","year":"1989","journal-title":"J. ACM"},{"issue":"No 3","key":"10.1016\/0141-9331(93)90047-B_BIB35","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/68012.68014","article-title":"Automatic verification of database transaction safety","volume":"Vol 12","author":"Sheard","year":"1989","journal-title":"ACM Trans. Database Syst."},{"key":"10.1016\/0141-9331(93)90047-B_BIB36","unstructured":"Stemple, D, Stanton, R B, Sheard, T, Philbrow, P, Morrison, R, Kirby, G N C, Fegaras, L, Cooper, R L, Connor, R C H, Atkinson, M P and Alagic, S \u2018Type-safe linguistic reflection: a generator technology\u2018 ACM-IOPLAS submitted for publication"},{"issue":"No 6","key":"10.1016\/0141-9331(93)90047-B_BIB37","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1093\/comjnl\/31.6.540","article-title":"Safe browsing in a strongly typed persistent environment","volume":"Vol 31","author":"Dearle","year":"1988","journal-title":"Comput. J."},{"key":"10.1016\/0141-9331(93)90047-B_BIB38_1","series-title":"Third International Conference on Persistent Object Systems","first-page":"96","article-title":"Browsing, grazing and nibbling persistent data structures","author":"Dearle","year":"1989"},{"key":"10.1016\/0141-9331(93)90047-B_BIB38_2","series-title":"Persistent Object Systems","first-page":"56","year":"1989"},{"key":"10.1016\/0141-9331(93)90047-B_BIB39","series-title":"13th VLDB","first-page":"117","article-title":"Constructing database systems in a persistent environment","author":"Cooper","year":"1987"},{"key":"10.1016\/0141-9331(93)90047-B_BIB40","series-title":"PhD Thesis","article-title":"On the utilisation of persistent programming environments","author":"Cooper","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB41","series-title":"Proc. 9th International Conference on the Entity Relationship Approach","first-page":"35","article-title":"Configurable data modelling systems","author":"Cooper","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB42_1","series-title":"Third International Workshop on Database Programming Languages","first-page":"289","article-title":"Using type transformation in database system implementation","author":"Fegaras","year":"1991"},{"key":"10.1016\/0141-9331(93)90047-B_BIB42_2","series-title":"Database Programming Languages: Bulk Types & Persistent Data","first-page":"337","year":"1992"},{"key":"10.1016\/0141-9331(93)90047-B_BIB43","series-title":"25th Hawaii International Conference on Systems Sciences","first-page":"844","article-title":"Linguistic reflection: a bridge from programming to database languages","author":"Stemple","year":"1992"},{"key":"10.1016\/0141-9331(93)90047-B_BIB44","series-title":"Eleventh International Conference on Automated Deduction (CADE-11)","article-title":"Uniform traversal combinators: definition, use and properties","author":"Fegaras","year":"1992"},{"key":"10.1016\/0141-9331(93)90047-B_BIB45","article-title":"Typeful programming","volume":"45","author":"Cardelli","year":"1989"},{"key":"10.1016\/0141-9331(93)90047-B_BIB46","series-title":"Research Report 77\u201389","article-title":"The Napier88 reference manual","author":"Morrison","year":"1989"},{"key":"10.1016\/0141-9331(93)90047-B_BIB47","series-title":"Research Report CS\/90\/16","article-title":"An adaptive graphical browser for Napier88","author":"Kirby","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB48","author":"Cardelli","year":"1985"},{"key":"10.1016\/0141-9331(93)90047-B_BIB49","series-title":"PPRR39","article-title":"PS-Algol Reference Manual","year":"1988"},{"key":"10.1016\/0141-9331(93)90047-B_BIB50","series-title":"Technical Report 90\u2013109","article-title":"A user's guide to TRPL: a compile-time reflective programming language","author":"Sheard","year":"1990"},{"key":"10.1016\/0141-9331(93)90047-B_BIB51","series-title":"Proc. 25th International Conference on Systems Sciences","first-page":"820","article-title":"Persistent programming with strongly typed linguistic reflection","author":"Kirby","year":"1992"},{"key":"10.1016\/0141-9331(93)90047-B_BIB52","series-title":"Australian Database Conference","article-title":"Reflective programming: an application generator technology","author":"Morrison","year":"1992"},{"key":"10.1016\/0141-9331(93)90047-B_BIB53","series-title":"5th International Conference on Persistent Object Systems","article-title":"Persistent hyper-programs","author":"Kirby","year":"1992"}],"container-title":["Microprocessors and Microsystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014193319390047B?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014193319390047B?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T04:28:42Z","timestamp":1553488122000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014193319390047B"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,1]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,1]]}},"alternative-id":["014193319390047B"],"URL":"https:\/\/doi.org\/10.1016\/0141-9331(93)90047-b","relation":{},"ISSN":["0141-9331"],"issn-type":[{"value":"0141-9331","type":"print"}],"subject":[],"published":{"date-parts":[[1993,1]]}}}