{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:05Z","timestamp":1772163965941,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,10,12]],"date-time":"2005-10-12T00:00:00Z","timestamp":1129075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,10,12]]},"DOI":"10.1145\/1094811.1094847","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T12:34:39Z","timestamp":1131366879000},"page":"455-471","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Combining the robustness of checked exceptions with the flexibility of unchecked exceptions using anchored exception declarations"],"prefix":"10.1145","author":[{"given":"Marko","family":"van Dooren","sequence":"first","affiliation":[{"name":"University of Leuven, Leuven, Belgium"}]},{"given":"Eric","family":"Steegmans","sequence":"additional","affiliation":[{"name":"University of Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2005,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. FSE 2004 Workshop on Specification and Verification of Component-Based Systems.]]","author":"Aldrich J.","unstructured":"J. Aldrich and K. Donnelly . Selective open recursion: Modular reasoning about components and inheritance . In Proc. FSE 2004 Workshop on Specification and Verification of Component-Based Systems.]] J. Aldrich and K. Donnelly. Selective open recursion: Modular reasoning about components and inheritance. In Proc. FSE 2004 Workshop on Specification and Verification of Component-Based Systems.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/777388.777394"},{"key":"e_1_3_2_1_3_1","volume-title":"CASSIS 2004 proceedings","author":"Barnett M.","year":"2004","unstructured":"M. Barnett , K. R. M. Leino , and W. Schulte . The Spec# programming system: An overview . In CASSIS 2004 proceedings , 2004 .]] M. Barnett, K. R. M. Leino, and W. Schulte. The Spec# programming system: An overview. In CASSIS 2004 proceedings, 2004.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.877844"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/372202.372786"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.926173"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/316158.316171"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/97945.97984"},{"key":"e_1_3_2_1_9_1","volume-title":"December","author":"ECMA Technical Committee 39 (TC39) Task Group 2 (TG2). C# Language Specification. ECMA","year":"2002","unstructured":"ECMA Technical Committee 39 (TC39) Task Group 2 (TG2). C# Language Specification. ECMA , 2 edition , December 2002 .]] ECMA Technical Committee 39 (TC39) Task Group 2 (TG2). C# Language Specification. ECMA, 2 edition, December 2002.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647166.717973"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 1st Workshop on Types in Compilation","author":"F\u00e4hndrich M.","year":"1997","unstructured":"M. F\u00e4hndrich and A. Aiken . Refined type inference for ML . In Proceedings of the 1st Workshop on Types in Compilation , June 1997 .]] M. F\u00e4hndrich and A. Aiken. Refined type inference for ML. In Proceedings of the 1st Workshop on Types in Compilation, June 1997.]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268961"},{"key":"e_1_3_2_1_14_1","volume-title":"Design patterns: elements of reusable object-oriented software","author":"Gamma E.","year":"1995","unstructured":"E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design patterns: elements of reusable object-oriented software . Addison-Wesley Longman Publishing Co., Inc. , 1995 .]] E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc., 1995.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00062-0"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/581478.581488"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/361227.361230"},{"key":"e_1_3_2_1_18_1","volume-title":"The Java Language Specification","author":"J. Gosling","year":"2000","unstructured":"J. Gosling et al. The Java Language Specification , Second Edition. Addison-Wesley Longman Publishing Co., Inc. , 2000 .]] J. Gosling et al. The Java Language Specification, Second Edition. Addison-Wesley Longman Publishing Co., Inc., 2000.]]"},{"key":"e_1_3_2_1_19_1","volume-title":"Record of the fifth ACM SIGPLAN workshop on ML and its Applications","author":"Guzm\u00e1n J.","year":"1994","unstructured":"J. Guzm\u00e1n and A. Su\u00e1rez . An Extended Type System for Exceptions . In Record of the fifth ACM SIGPLAN workshop on ML and its Applications , June 1994 . Also appears as Research Report 2265, INRIA, BP 105 - 78153 Le Chesnay Cedex, France .]] J. Guzm\u00e1n and A. Su\u00e1rez. An Extended Type System for Exceptions. In Record of the fifth ACM SIGPLAN workshop on ML and its Applications, June 1994. Also appears as Research Report 2265, INRIA, BP 105 - 78153 Le Chesnay Cedex, France.]]"},{"key":"e_1_3_2_1_20_1","unstructured":"A. Hejlsberg. The trouble with checked exceptions. http:\/\/www.artima.com\/intv\/handcuffs.html.]]  A. Hejlsberg. The trouble with checked exceptions. http:\/\/www.artima.com\/intv\/handcuffs.html.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/97945.97967"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/503502.503505"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/645395.651930"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00057-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301637"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/165854.165891"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2004.14"},{"key":"e_1_3_2_1_29_1","volume-title":"Xerox PARC","author":"Lippert M.","year":"1999","unstructured":"M. Lippert and C. Lopes . A study on exception detection and handling using aspect-oriented programming. Technical report , Xerox PARC , 1999 .]] M. Lippert and C. Lopes. A study on exception detection and handling using aspect-oriented programming. Technical report, Xerox PARC, 1999.]]"},{"key":"e_1_3_2_1_30_1","volume-title":"Abstraction and specification in program development","author":"Liskov B.","year":"1986","unstructured":"B. Liskov . Abstraction and specification in program development . MIT Press , 1986 .]] B. Liskov. Abstraction and specification in program development. MIT Press, 1986.]]"},{"key":"e_1_3_2_1_32_1","volume-title":"Object-oriented software construction","author":"Meyer B.","year":"1997","unstructured":"B. Meyer . Object-oriented software construction ( 2 nd ed.). Prentice-Hall, Inc. , 1997 .]] B. Meyer. Object-oriented software construction (2nd ed.). Prentice-Hall, Inc., 1997.]]","edition":"2"},{"key":"e_1_3_2_1_33_1","article-title":"Overloading vs. object technology","author":"Meyer B.","year":"2001","unstructured":"B. Meyer . Overloading vs. object technology . Journal of Object-Oriented Programming , October 2001 .]] B. Meyer. Overloading vs. object technology. Journal of Object-Oriented Programming, October 2001.]]","journal-title":"Journal of Object-Oriented Programming"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/644760.644768"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053375"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/944331.944358"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292565"},{"key":"e_1_3_2_1_38_1","volume-title":"An introduction to formal specification and Z","author":"Potter B.","year":"1991","unstructured":"B. Potter , J. Sinclair , and D. Till . An introduction to formal specification and Z . Prentice-Hall, Inc. , 1991 .]] B. Potter, J. Sinclair, and D. Till. An introduction to formal specification and Z. Prentice-Hall, Inc., 1991.]]"},{"key":"e_1_3_2_1_39_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/3-540-48166-4_20","volume-title":"Software Engineering -- ESEC\/FSE'99","author":"Robillard M. P.","year":"1999","unstructured":"M. P. Robillard and G. C. Murphy . Analyzing exception flow in Java programs . In Software Engineering -- ESEC\/FSE'99 , volume 1687 of Lecture Notes in Computer Science , pages 322 -- 337 . Springer-Verlag , September 1999 .]] M. P. Robillard and G. C. Murphy. Analyzing exception flow in Java programs. In Software Engineering -- ESEC\/FSE'99, volume 1687 of Lecture Notes in Computer Science, pages 322--337. Springer-Verlag, September 1999.]]"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/355045.355046"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/941566.941569"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/568671.568678"},{"key":"e_1_3_2_1_43_1","first-page":"67","volume-title":"Computational Complexity","author":"Ryder B. G.","year":"2000","unstructured":"B. G. Ryder , D. Smith , U. Kremer , M. Gordon , and N. Shah . A static study of Java exceptions using JESP . In Computational Complexity , pages 67 -- 81 , 2000 .]] B. G. Ryder, D. Smith, U. Kremer, M. Gordon, and N. Shah. A static study of Java exceptions using JESP. In Computational Complexity, pages 67--81, 2000.]]"},{"key":"e_1_3_2_1_44_1","first-page":"23","volume-title":"APAQS '01: Proceedings of the Second Asia-Pacific Conference on Quality Software","author":"Ryu S.","year":"2001","unstructured":"S. Ryu and K. Yi . Exception analysis for multithreaded Java programs . In APAQS '01: Proceedings of the Second Asia-Pacific Conference on Quality Software , page 23 , Washington, DC, USA , 2001 . IEEE Computer Society.]] S. Ryu and K. Yi. Exception analysis for multithreaded Java programs. In APAQS '01: Proceedings of the Second Asia-Pacific Conference on Quality Software, page 23, Washington, DC, USA, 2001. IEEE Computer Society.]]"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380231007"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853291"},{"key":"e_1_3_2_1_47_1","unstructured":"N. Smeets and M. van Dooren. Jnome 2004. http:\/\/www.jnome.org.]]  N. Smeets and M. van Dooren. Jnome 2004. http:\/\/www.jnome.org.]]"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236363"},{"key":"e_1_3_2_1_51_1","volume-title":"Duxbury","author":"Winston W.","year":"2003","unstructured":"W. Winston . Operations Research : Applications and Algorithms . Duxbury , 2003 .]] W. Winston. Operations Research: Applications and Algorithms. Duxbury, 2003.]]"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318.3320"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24052"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58485-4_44"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(96)00044-5"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/647166.717966"}],"event":{"name":"OOPSLA05: ACM SIGPLAN Object Oriented Programming Systems and Applications Conference","location":"San Diego CA USA","acronym":"OOPSLA05","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1094811.1094847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1094811.1094847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:09Z","timestamp":1750248489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1094811.1094847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,12]]},"references-count":51,"alternative-id":["10.1145\/1094811.1094847","10.1145\/1094811"],"URL":"https:\/\/doi.org\/10.1145\/1094811.1094847","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1103845.1094847","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,10,12]]},"assertion":[{"value":"2005-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}