{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:27:58Z","timestamp":1720625278604},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2004,4,1]],"date-time":"2004-04-01T00:00:00Z","timestamp":1080777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3406,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2004,4]]},"DOI":"10.1016\/s1571-0661(05)82538-1","type":"journal-article","created":{"date-parts":[[2005,5,19]],"date-time":"2005-05-19T13:46:30Z","timestamp":1116510390000},"page":"240-260","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Plan in Maude Specifying an Active Network Programming Language"],"prefix":"10.1016","volume":"71","author":[{"given":"Mark-Oliver","family":"Stehr","sequence":"first","affiliation":[]},{"given":"Carolyn L.","family":"Talcott","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(05)82538-1_BIB1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S095679689700261X","article-title":"A foundation for actor computation","volume":"7","author":"Agha","year":"1997","journal-title":"Journal of Functional Programming"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB2","series-title":"Maude: Specification and Programming in Rewriting Logic","author":"Clavel","year":"1999"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB3","unstructured":"DARPA Information and Survivability Conference and Exposition (DISCEX\u203200). IEEE, January 2000."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB4","unstructured":"DARPA Active Networks Conference and Exposition (DANCE). IEEE, May 2002."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB5","series-title":"DARPA Information and Survivability Conference and Exposition (DISCEX\u203200)","first-page":"251","article-title":"Formal specification and analysis of active networks and communication protocols: The Maude experience","author":"Denker","year":"2000"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB6","unstructured":"S. Eker. Maude 2.0 alpha release notes, 2002."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB7","series-title":"The 4th International Workshop on Rewriting Logic and its Applications, Pisa, Italy, September 19-21, 2002, Proceedings, volume 71 of Electronic Notes in Theoretical Computer Science.","article-title":"The Maude LTL model checker","author":"Eker","year":"2002"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB8","series-title":"Formal Description of Programming Concepts III","first-page":"193","article-title":"Control operators, the SECD-machine, and the \u03bb-calculus","author":"Felleisen","year":"1986"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB9","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/0304-3975(92)90014-7","article-title":"The revised report on the syntactic theories of sequential control and state","volume":"103","author":"Felleisen","year":"1992","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB10","unstructured":"C. A. Gunther et al. A packet language for active networks. http:\/\/www.cis.upenn.edu\/~switchware\/PLAN\/."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB11","unstructured":"C.A. Gunther et al. The switchware project. http:\/\/www.cis.upenn.edu\/~switchware\/."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB12","unstructured":"M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles. Network programming using PLAN. In Proceedings of the 1998 Workshop on Internet Programming Languages (IPL\u203298), Part of IEEE International Conference on Computer Languages (ICCL \u203298), Chicago, IL, May 1998, May 1998. http:\/\/www.cis.upenn.edu\/~switchware\/papers\/progplan.ps."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB13","doi-asserted-by":"crossref","unstructured":"M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles. PLAN: A Packet Language for Active Networks. In Proceedings of the 1998 ACM SIGPLAN International Conference on Functional Programming, Baltimore, Maryland, September 1998, pages 86-93. ACM, 1998. http:\/\/www.cis.upenn.edu\/~switchware\/papers\/plan.ps.","DOI":"10.1145\/289423.289431"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB14","series-title":"Active Networks, First International Working Conference, IWAN \u203299, Berlin, Germany, June 30 \u2013 July 2, 1999, Proceedings, volume 1653 of Lecture Notes in Computer Science","first-page":"307","article-title":"A secure PLAN","author":"Hicks","year":"1999"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB15","unstructured":"M. Hicks, J. T. Moore, and P. Kakkar. Plan programmers guide for plan version 3.2. http:\/\/www.cis.upenn.edu\/~switchware\/PLAN\/docs-ocaml\/guide.ps, July 2001."},{"issue":"1","key":"10.1016\/S1571-0661(05)82538-1_BIB16","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1006\/inco.1995.1077","article-title":"A Variable Typed Logic of Effects","volume":"119","author":"Honsell","year":"1995","journal-title":"Information and Computation"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB17","unstructured":"P. Kakkar. The specification of PLAN. http:\/\/www.cis.upenn.edu\/~switchware\/PLAN\/spec\/spec.ps, 1999."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB18","unstructured":"P. Kakkar, C. A. Gunther, and M. Abadi. Reasoning About Secrecy for Active Networks. In 13th IEEE Computer Security Foundations Workshop (CSFW\u203200), 3-5 July 2000, Cambridge, England, Proceedings, 2000. http:\/\/www.cis.upenn.edu\/~switchware\/papers\/csfw.ps."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB19","series-title":"HOOTS\u203299, Higher Order Operational Techniques in Semantics Paris, France, September 30 and October 1, 1999, Proceedings, volume 26 of Electronic Notes in Theoretical Computer Science.","article-title":"Specifying the PLAN networking programming language","author":"Kakkar","year":"1999"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB20","series-title":"Proceedings of the 16th EATCS Colloquium on Automata, Languages, and Programming, Stresa, volume 372 of Lecture Notes in Computer Science","first-page":"574","article-title":"Programming, transforming, and proving with function abstractions and memories","author":"Mason","year":"1989"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB21","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/S0304-3975(99)00009-2","article-title":"Actor languages: Their syntax, semantics, translation, and equivalence","volume":"220","author":"Mason","year":"1999","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB22","series-title":"Reflections on the Foundations of Mathematics: Essays in honor of Solomon Feferman, Lecture Notes in Logic","first-page":"299","article-title":"Feferman-Landin Logic","author":"Mason","year":"2002"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB23","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0304-3975(92)90182-F","article-title":"Conditional rewriting logic as a unified model of concurrency","volume":"96","author":"Meseguer","year":"1992","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB24","series-title":"DARPA Active Networks Conference and Exposition (DANCE)","first-page":"494","article-title":"Maude as a wide-spectrum framework for formal modeling and analysis of active networks","author":"Meseguer","year":"2002"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB25","series-title":"Chunks in PLAN: Language support for programs as packets. Technical report","author":"Moore","year":"1999"},{"issue":"3\/4","key":"10.1016\/S1571-0661(05)82538-1_BIB26","first-page":"287","article-title":"Reasoning about programs in continuation-passing style","volume":"6","author":"Sabry","year":"1993","journal-title":"Lisp and Symbolic Computation"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB27","doi-asserted-by":"crossref","unstructured":"S.F. Smith, C.L. Talcott. Specification diagrams for actor systems. Higer-Order and Symbolic Computation, 2002. To appear.","DOI":"10.1023\/A:1022934504959"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB28","series-title":"The 3rd International Workshop on Rewriting Logic and its Applications Kanazawa City Cultural Hall, Kanzawa Japan, September 18-20, 2000, Proceedings, volume 36 of Electronic Notes in Theoretical Computer Science","first-page":"71","article-title":"CINNI \u2013 A Generic Calculus of Explicit Substitutions and its Application to \u03bb-, \u03c3- and \u03c0-calculi","author":"Stehr","year":"2000"},{"key":"10.1016\/S1571-0661(05)82538-1_BIB29","unstructured":"M.-O. Stehr. Programming, specification, and interactive theorem proving: Towards a unified language based on equational logic, rewriting logic and type theory. Ph.D. thesis, forthcoming, 2002."},{"key":"10.1016\/S1571-0661(05)82538-1_BIB30","series-title":"Higher Order Operational Techniques in Semantics","article-title":"Reasoning about functions with effects","author":"Talcott","year":"1996"},{"issue":"1","key":"10.1016\/S1571-0661(05)82538-1_BIB31","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/35.568214","article-title":"A survey of active network research","volume":"35","author":"Tennenhouse","year":"1997","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"10.1016\/S1571-0661(05)82538-1_BIB32","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1023\/A:1014408032446","article-title":"From syntactic theories to interpreters: Automating the proof of unique decomposition","volume":"14","author":"Xiao","year":"2001","journal-title":"Higher-Order and Symbolic Computation"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105825381?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105825381?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T11:07:39Z","timestamp":1586257659000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066105825381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4]]},"references-count":32,"alternative-id":["S1571066105825381"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(05)82538-1","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2004,4]]}}}