{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:25Z","timestamp":1772163925367,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,10,12]],"date-time":"2005-10-12T00:00:00Z","timestamp":1129075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,10,12]]},"DOI":"10.1145\/1094811.1094848","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T12:34:39Z","timestamp":1131366879000},"page":"473-486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Incrementalization across object abstraction"],"prefix":"10.1145","author":[{"given":"Yanhong A.","family":"Liu","sequence":"first","affiliation":[{"name":"State University of New York at Stony Brook, Stony Brook, NY"}]},{"given":"Scott D.","family":"Stoller","sequence":"additional","affiliation":[{"name":"State University of New York at Stony Brook, Stony Brook, NY"}]},{"given":"Michael","family":"Gorbovitski","sequence":"additional","affiliation":[{"name":"State University of New York at Stony Brook, Stony Brook, NY"}]},{"given":"Tom","family":"Rothamel","sequence":"additional","affiliation":[{"name":"State University of New York at Stony Brook, Stony Brook, NY"}]},{"given":"Yanni Ellen","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Manitoba, Winnipeg, MB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2005,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(03)00048-X"},{"key":"e_1_3_2_1_2_1","volume-title":"Approved","author":"American National Standards Institute, Inc.","year":"2004","unstructured":"American National Standards Institute, Inc. Role-based access control. ANSI INCITS 359-2004 . Approved Feb. 19, 2004 . http:\/\/csrc.nist.gov\/rbac\/. American National Standards Institute, Inc. Role-based access control. ANSI INCITS 359-2004. Approved Feb. 19, 2004. http:\/\/csrc.nist.gov\/rbac\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/780732.780741"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA379930"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1780.1781"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(95)00003-B"},{"key":"e_1_3_2_1_8_1","first-page":"126","volume-title":"M\u00f6ller {33}","author":"Cai J.","unstructured":"J. Cai , P. Facon , F. Henglein , R. Paige , and E. Schonberg . Type analysis and data structure selection . In M\u00f6ller {33} , pages 126 -- 164 . J. Cai, P. Facon, F. Henglein, R. Paige, and E. Schonberg. Type analysis and data structure selection. In M\u00f6ller {33}, pages 126--164."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645917.672169"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/158511.158639"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/359863.359888"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/185087.185108"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236344"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/355604.361591"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/383721.383732"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/265779.265831"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/535661"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(83)90015-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170066"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00289507"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090100067"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.233858"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/42190.42347"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379676"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/800233.807045"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/888251.888268"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053468.1053471"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/291889.291895"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(01)00003-X"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(94)00031-9"},{"key":"e_1_3_2_1_32_1","volume-title":"North-Holland","author":"Meertens L. G. L. T.","year":"1987","unstructured":"L. G. L. T. Meertens , editor. Program Specification and Transformation . North-Holland , Amsterdam , 1987 . Proceedings of the IFIP TC2\/WG 2.1 Working Conference on Program Specification and Transformation, Bad T\u00f6lz, FRG, April 1986. L. G. L. T. Meertens, editor. Program Specification and Transformation. North-Holland, Amsterdam, 1987. Proceedings of the IFIP TC2\/WG 2.1 Working Conference on Program Specification and Transformation, Bad T\u00f6lz, FRG, April 1986."},{"key":"e_1_3_2_1_33_1","volume-title":"North-Holland","author":"M\u00f6ller B.","year":"1991","unstructured":"B. M\u00f6ller , editor. Constructing Programs from Specifications . North-Holland , Amsterdam , 1991 . B. M\u00f6ller, editor. Constructing Programs from Specifications. North-Holland, Amsterdam, 1991."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504294"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/645396.651970"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1986.233070"},{"key":"e_1_3_2_1_37_1","first-page":"69","volume-title":"Computing and Information","author":"Paige R.","year":"1989","unstructured":"R. Paige . Real-time simulation of a set machine on a RAM . In Computing and Information , Vol. II , pages 69 -- 73 . Canadian Scholars Press , 1989 . Proceedings of ICCI '89: The International Conference on Computing and Information, Toronto, Canada, May 23-27, 1989. R. Paige. Real-time simulation of a set machine on a RAM. In Computing and Information, Vol. II, pages 69--73. Canadian Scholars Press, 1989. Proceedings of ICCI '89: The International Conference on Computing and Information, Toronto, Canada, May 23-27, 1989."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357177"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1137\/0216062"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/355602.361309"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/80153"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/357133.357135"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/778559.778561"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58788"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30175-2_3"},{"key":"e_1_3_2_1_47_1","volume-title":"The Z Notation: A Reference Manual","author":"Spivey J. M.","year":"1992","unstructured":"J. M. Spivey . The Z Notation: A Reference Manual . Prentice-Hall , 2 edition, 1992 . J. M. Spivey. The Z Notation: A Reference Manual. Prentice-Hall, 2 edition, 1992."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/320384.320400"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/298514.298570"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/103135.103137"}],"event":{"name":"OOPSLA05: ACM SIGPLAN Object Oriented Programming Systems and Applications Conference","location":"San Diego CA USA","acronym":"OOPSLA05","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1094811.1094848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1094811.1094848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:09Z","timestamp":1750248489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1094811.1094848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,12]]},"references-count":49,"alternative-id":["10.1145\/1094811.1094848","10.1145\/1094811"],"URL":"https:\/\/doi.org\/10.1145\/1094811.1094848","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1103845.1094848","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,10,12]]},"assertion":[{"value":"2005-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}