{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:53Z","timestamp":1750308233483,"version":"3.41.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[1985,8,1]],"date-time":"1985-08-01T00:00:00Z","timestamp":491702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[1985,8]]},"DOI":"10.1145\/1012497.1012518","type":"journal-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:09Z","timestamp":1097170749000},"page":"55-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Conditional rewriting"],"prefix":"10.1145","volume":"10","author":[{"given":"Nachum","family":"Dershowitz","sequence":"first","affiliation":[]},{"given":"David A.","family":"Plaisted","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[1985,8]]},"reference":[{"volume-title":"Prentice-Hall","year":"1985","author":"Barbutti Barbutti","key":"e_1_2_1_1_1"},{"volume-title":"Proceedings of the First Annual National Conference on Artificial Intelligence, Stanford, CA","year":"1980","author":"Chester D.","key":"e_1_2_1_2_1"},{"volume-title":"Proceedings of the Seminaire d'Informatique Theorique","year":"1982","author":"Dershowitz N.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","unstructured":"{Dersowitz-85} Dershowitz N. \"Computing with rewrite systems\". Information and Control (1985) (to appear).  {Dersowitz-85} Dershowitz N. \"Computing with rewrite systems\". Information and Control (1985) (to appear)."},{"key":"e_1_2_1_5_1","first-page":"313","volume-title":"Proceedings of the Second International Conference on Logic Programming, Uppsala, Sweden (July","author":"Dershowitz N.","year":"1984"},{"volume-title":"Proceedings of the Eleventh EATCS Colloquium on Automata, Languages and Programming, Antwerp, Belgium (July","year":"1984","author":"Fribourg L.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"{Goguen-Meseguer-84} Goguen J. A. and Meseguer J. \"Equality types modules and generics for logic programming\". Logic Programming (1984).  {Goguen-Meseguer-84} Goguen J. A. and Meseguer J. \"Equality types modules and generics for logic programming\". Logic Programming (1984).","DOI":"10.1016\/0743-1066(84)90004-9"},{"key":"e_1_2_1_8_1","first-page":"263","volume-title":"Computational Problems in Abstract Algebra","author":"Knuth D. E.","year":"1970"},{"key":"e_1_2_1_9_1","first-page":"315","volume-title":"Logic Programming, Keith L. Clark and Sten- \u00c5ke T\u00e4rnlund, eds","author":"Komorowski H. J.","year":"1982"},{"key":"e_1_2_1_10_1","first-page":"569","volume-title":"Proceedings of the IFIP Congress","author":"Kowalski R. A.","year":"1974"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/800055.802049"},{"key":"e_1_2_1_12_1","unstructured":"{Reddy-85} Reddy U. \"Narrowing as the operational semantics of functional languages\" Unpublished report Department of Computer Science University of Utah Salt Lake City UT 1985 (submitted).  {Reddy-85} Reddy U. \"Narrowing as the operational semantics of functional languages\" Unpublished report Department of Computer Science University of Utah Salt Lake City UT 1985 (submitted)."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/321160.321166"},{"key":"e_1_2_1_14_1","first-page":"399","volume-title":"Machine Intelligence 10, P. Hayes, D. Michie and Y-H","author":"Robinson J. A.","year":"1982"},{"volume-title":"Institute for New Generation Computer Technology","year":"1983","author":"Shapiro E. Y.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/321850.321859"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1012497.1012518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1012497.1012518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:42Z","timestamp":1750264302000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1012497.1012518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,8]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1985,8]]}},"alternative-id":["10.1145\/1012497.1012518"],"URL":"https:\/\/doi.org\/10.1145\/1012497.1012518","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[1985,8]]},"assertion":[{"value":"1985-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}