{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:08:11Z","timestamp":1761610091677,"version":"build-2065373602"},"reference-count":19,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":4137,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,4]]},"DOI":"10.1016\/s1571-0661(04)80438-9","type":"journal-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T15:29:25Z","timestamp":1096385365000},"page":"56-67","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Composition of Distributed Software with Algon \u2014 Concepts and Possibilities"],"prefix":"10.1016","volume":"65","author":[{"given":"Judith","family":"Bishop","sequence":"first","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Basil","family":"Worrall","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB1","doi-asserted-by":"crossref","unstructured":"Aksit, M., J. Bosch, W. van der Sterren and L. Bergmans, Real-Time Specification Inheritance Anomalies and Real-Time Filters, in: [19], 1994, pp. 386\u2013407.","DOI":"10.1007\/BFb0052193"},{"issue":"Issue 2es","key":"10.1016\/S1571-0661(04)80438-9_NEWBIB2","article-title":"Interactive execution of distributed algorithms","volume":"1","author":"Ben-Ari","year":"2001","journal-title":"ACM Journal of Educational Resources in Computing"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB3","first-page":"31","article-title":"A New Way to query GIS on the web","volume":"15","author":"Coetzee","year":"1998","journal-title":"IEEE Computer"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB4","unstructured":"Coetzee, S. M. and J. M. Bishop, GIS and the Internet, in: Proceedings of ParCo 2001. MiniSymposium: High Performance GIS: from Parallel Algorithms to Systems, Naples, 2001."},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB5","unstructured":"Dellarocas C., Toward Exception Handling Infrastructures for Component-Based Systems, in: International Workshop on Component-Based Software Engineering. Proceedings of the 1998 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, Kyoto, Japan, 1998."},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB6","unstructured":"Dominick L. and K. Ostermann, Supporting Extension of Components with new Paradigms, in: OOPSLA 2000 workshop on Advanced Separation of Concerns, Minneapolis, Minnesota USA, 2000."},{"year":"1994","series-title":"\u201cDesign Patterns: Elements of Reusable Object-Oriented Software,\u201d","author":"Gamma","key":"10.1016\/S1571-0661(04)80438-9_NEWBIB7"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB8","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/4434.641625","article-title":"Garf: A Tool for Programming Reliable Distributed Applications","volume":"5","author":"Guerraoui","year":"1997","journal-title":"IEEE Concurrency"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB9","doi-asserted-by":"crossref","unstructured":"Kiczales G., E. Hilsdale, J. Hugunin, M. Kersten, J. Palm and W. Griswold, An Overview of AspectJ, in: European Conference on Object-Oriented Programming. ECOOP 2001, Budapest, Hungary, 2001.","DOI":"10.1007\/3-540-45337-7_18"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB10","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0950-5849(00)00170-1","article-title":"A two-layered class approach for the reuse of sychnronization code","volume":"43","author":"Lu","year":"2001","journal-title":"Information and Software Technology"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB11","doi-asserted-by":"crossref","unstructured":"Okamura, H. and Y. Ishikawa, Object Location Control using Meta-level Programming, in: [19], 1994, pp. 299\u2013319.","DOI":"10.1007\/BFb0052189"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB12","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/383845.383856","article-title":"Using multidimensional separation of concerns to (re)shape evolving software","volume":"44","author":"Ossher","year":"2001","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB13","unstructured":"Prentezis T., \u201cManagement of Long-Running High-Performance Persistent Object Stores,\u201d Ph.D. thesis, Department of Computing Science, Department of Computing Science, University of Glasgow (2000)."},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB14","unstructured":"Renaud K., JavaCloak: Considering the Limitations of Proxies for Runtime Specialisation, in: Proceedings of the 2001 Annual Conference of Computer Scientists and Information Technologists, Pretoria, South Africa, 2001."},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB15","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/358527.358537","article-title":"An Optimal Algorithm for Mutual Exclusion Algorithms","volume":"24","author":"Ricart","year":"1981","journal-title":"Communications of the ACM"},{"year":"1994","series-title":"\u201cAdvanced Concepts in Operating Systems\u201d","author":"Singhal","key":"10.1016\/S1571-0661(04)80438-9_NEWBIB16"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB17","doi-asserted-by":"crossref","unstructured":"Tarr, P., M. D'Hondt, L. Bergmans and C. V. Lopes, editors, \u201cAspects and Dimensions of Concern: Requirements on, Challenge Problems for, Advanced Separation of Concerns. ECOOP 2000 Workshop Proceedings,\u201d Springer Verlag, 2000.","DOI":"10.1007\/3-540-44555-2_16"},{"year":"2000","series-title":"\u201cIntroduction to Distributed Algorithms\u201d","author":"Tel","key":"10.1016\/S1571-0661(04)80438-9_NEWBIB18"},{"key":"10.1016\/S1571-0661(04)80438-9_NEWBIB19","doi-asserted-by":"crossref","unstructured":"Tokoro, M. and R. Pareschi, editors, Object-Oriented Programming, Proceedings of the 8th European Conference ECOOP'94. Lecture Notes in Computer Science 821, Springer Verlag, Bologna, Italy, 1994.","DOI":"10.1007\/BFb0052172"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104804389?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104804389?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:04:33Z","timestamp":1761609873000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104804389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,4]]}},"alternative-id":["S1571066104804389"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)80438-9","relation":{},"ISSN":["1571-0661"],"issn-type":[{"type":"print","value":"1571-0661"}],"subject":[],"published":{"date-parts":[[2002,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Composition of Distributed Software with Algon \u2014 Concepts and Possibilities","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)80438-9","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}