{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T10:53:20Z","timestamp":1672916000738},"reference-count":47,"publisher":"Elsevier BV","issue":"2-4","license":[{"start":{"date-parts":[[2001,2,1]],"date-time":"2001-02-01T00:00:00Z","timestamp":980985600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Processing Letters"],"published-print":{"date-parts":[[2001,2]]},"DOI":"10.1016\/s0020-0190(00)00209-x","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T15:58:31Z","timestamp":1027612711000},"page":"123-129","source":"Crossref","is-referenced-by-count":2,"title":["Legacy"],"prefix":"10.1016","volume":"77","author":[{"given":"Tony","family":"Hoare","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0020-0190(00)00209-X_BIB001","series-title":"Theoretical Aspects of Computer Software","article-title":"Secrecy by typing in security protocols","volume":"1281","author":"Abadi","year":"1997"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB002","series-title":"Process Algebra, Cambridge","author":"Baeten","year":"1990"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB003","article-title":"Monads, effects, and transformations","volume":"26","author":"Benton","year":"1999","journal-title":"ENTCS"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB004","series-title":"Proc. Internat. Conf. on Functional Programming","article-title":"Interlanguage working without tears","author":"Benton","year":"1999"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB005","series-title":"Algebra of Programming","author":"Bird","year":"1997"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB006","series-title":"Simula begin","author":"Birtwhistle","year":"1973"},{"issue":"5","key":"10.1016\/S0020-0190(00)00209-X_BIB007","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1145\/355592.365646","article-title":"Flow diagrams, Turing machines and languages with only two formation rules","volume":"9","author":"Bohm","year":"1966","journal-title":"Comm. ACM"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB008","series-title":"The Unified Modeling Language","author":"Booch","year":"1998"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB009","series-title":"FM'99\u2014Formal Methods","first-page":"608","article-title":"KVEST: Automated generation of test suites from formal specifications","volume":"1708","author":"Bourdonov","year":"1999"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB010","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1145\/828.833","article-title":"A theory of communicating sequential processes","volume":"31","author":"Brookes","year":"1984","journal-title":"J. ACM"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB011","series-title":"Foundations of Software Science and Computation Structures","first-page":"140","article-title":"Mobile ambients","volume":"1378","author":"Cardelli","year":"1998"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB012","series-title":"Proc. ACM Symp. on Principles of Programming Languages","first-page":"365","article-title":"Anytime, anywhere","author":"Cardelli","year":"2000"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB013","doi-asserted-by":"crossref","unstructured":"L. Cardelli, G. Ghelli, A.D. Gordon, Ambient groups and mobility types, Theoret. Comput. Sci., to appear","DOI":"10.1007\/3-540-44929-9_25"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB014","series-title":"Programming in Prolog","author":"Clocksin","year":"1981"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB015","series-title":"Introducing Formal Methods: The CICS Experience","author":"Collins","year":"1989"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB016","series-title":"Microsoft Secrets","author":"Cusumano","year":"1996"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB017","series-title":"Structured Programming","author":"Dahl","year":"1972"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB018","series-title":"Report 159 SERC","article-title":"Extended static checking","author":"Detlefs","year":"1998"},{"issue":"10","key":"10.1016\/S0020-0190(00)00209-X_BIB019","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1145\/355604.361591","article-title":"Go to statement considered harmful","volume":"15","author":"Dijkstra","year":"1972","journal-title":"Comm. ACM"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB020","series-title":"A Discipline of Programming","author":"Dijkstra","year":"1976"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB021","series-title":"Proc. ACM Symp. on Principles of Programming Languages","first-page":"1","article-title":"AnnoDomini: From type theory to year 2000 conversion tool","author":"Eidorf","year":"2000"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB022","series-title":"Proc. Internat. Conf. on Functional Programming","article-title":"Functional reactive animation","author":"Elliott","year":"1997"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB023","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1090\/psapm\/019\/0235771","article-title":"Assigning meanings to programs","volume":"19","author":"Floyd","year":"1967","journal-title":"Proc. Symp. Appl. Math."},{"key":"10.1016\/S0020-0190(00)00209-X_BIB024","series-title":"Communicating Sequential Processes","author":"Hoare","year":"1985"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB025","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/BF00289507","article-title":"Proof of correctness of data representations","volume":"1","author":"Hoare","year":"1972","journal-title":"Acta Inform."},{"key":"10.1016\/S0020-0190(00)00209-X_BIB026","series-title":"ECOOP'99\u2014Object-Oriented Programming","first-page":"1","article-title":"A trace model for pointers and objects","volume":"1628","author":"Hoare","year":"1999"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB027","series-title":"Unifying Theories of Programming","author":"Hoare","year":"1998"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB028","series-title":"Design and Validation of Computer Protocols","author":"Holtzmann","year":"1991"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB029","series-title":"INMOS Transputer Reference Manual","year":"1988"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB030","unstructured":"G. Jones, M. Goldsmith, Programming in OCCAM, Prentice-Hall, Englewood Cliffs, NJ"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB031","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/BF01018827","article-title":"State in Haskell","volume":"8","author":"Launchbury","year":"1995","journal-title":"LISP and Symbolic Comput."},{"key":"10.1016\/S0020-0190(00)00209-X_BIB032","series-title":"Computational Logic","article-title":"Research directions in rewriting logic","volume":"165","author":"Messeguer","year":"1997"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB033","unstructured":"D. MacQueen, Personal communication"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB034","series-title":"Communication and Concurrency","author":"Milner","year":"1989"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB035","series-title":"The Definition of Standard ML","author":"Milner","year":"1990"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB036","series-title":"Communicating and Mobile Systems: the Pi-Calculus, Cambridge","author":"Milner","year":"1999"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB037","series-title":"Lecture Notes in Comput. Sci.","article-title":"Computational lambda-calculus and monads","author":"Moggi","year":"1989"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB038","series-title":"Proc. Internat. Conf. on Software Engineering","article-title":"Lackwit: A program understanding tool based on type inference","author":"O'Callaghan","year":"1997"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB039","series-title":"Applied Formal Methods\u2014FM-Trends 98","first-page":"338","article-title":"PVS: An experience report","volume":"1641","author":"Owre","year":"1998"},{"issue":"12","key":"10.1016\/S0020-0190(00)00209-X_BIB040","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1145\/361598.361623","article-title":"On the criteria to be used in decomposing systems into modules","volume":"15","author":"Parnas","year":"1972","journal-title":"Comm. ACM"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB041","series-title":"Report on the Programming Language Haskell 98","year":"1998"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB042","series-title":"Software Re-use","article-title":"Scripting COM components in Haskell","author":"Jones","year":"1998"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB043","article-title":"Functional reading of logic programs","author":"Seres","year":"2000","journal-title":"J. Univ. Comput. Sci."},{"issue":"2","key":"10.1016\/S0020-0190(00)00209-X_BIB044","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1006\/inco.1996.2613","article-title":"Region-based memory management","volume":"132","author":"Tofte","year":"1997","journal-title":"Inform. and Comput."},{"issue":"1","key":"10.1016\/S0020-0190(00)00209-X_BIB045","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1017\/S0956796897002967","article-title":"Algorithm + strategy = parallelism","volume":"8","author":"Trinder","year":"1998","journal-title":"J. Funct. Programming"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB046","series-title":"Personal communication","author":"Weise","year":"1998"},{"key":"10.1016\/S0020-0190(00)00209-X_BIB047","first-page":"269","article-title":"A calculus of durations","volume":"40","author":"Zhou","year":"1992","journal-title":"Inform. Process. Lett."}],"container-title":["Information Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002001900000209X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002001900000209X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T22:51:46Z","timestamp":1555887106000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002001900000209X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,2]]},"references-count":47,"journal-issue":{"issue":"2-4","published-print":{"date-parts":[[2001,2]]}},"alternative-id":["S002001900000209X"],"URL":"https:\/\/doi.org\/10.1016\/s0020-0190(00)00209-x","relation":{},"ISSN":["0020-0190"],"issn-type":[{"value":"0020-0190","type":"print"}],"subject":[],"published":{"date-parts":[[2001,2]]}}}