{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T06:20:09Z","timestamp":1763619609943,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,1,9]],"date-time":"2006-01-09T00:00:00Z","timestamp":1136764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,1,9]]},"DOI":"10.1145\/1111542.1111544","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Source transformation, analysis and generation in TXL"],"prefix":"10.1145","author":[{"given":"James R.","family":"Cordy","sequence":"first","affiliation":[{"name":"Queen's University, Kingston, Canada"}]}],"member":"320","published-online":{"date-parts":[[2006,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.37"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/129852.129859"},{"key":"e_1_3_2_1_3_1","unstructured":"K. Beck Extreme Programming Explained: Embrace Change 2nd Edition Addison-Wesley (2004).]]   K. Beck Extreme Programming Explained: Embrace Change 2nd Edition Addison-Wesley (2004).]]"},{"key":"e_1_3_2_1_4_1","unstructured":"J. A. Bergstra J. Heering and P. Klint Algebraic Specification ACM Press (1989).]]   J. A. Bergstra J. Heering and P. Klint Algebraic Specification ACM Press (1989).]]"},{"key":"e_1_3_2_1_5_1","first-page":"365","volume":"2001","author":"van den Brand M.","year":"2001","journal-title":"Proc. Compiler Construction"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.05.012"},{"volume-title":"Proc. LDTA 2004, ACM 4th International Workshop on Language Descriptions, Tools and Applications, Electronic Notes in Theoretical Computer Science110","year":"2004","author":"Cordy J. R.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"J. R. Cordy I. H. Carmichael and R. Halliday The TXL Programming Language Queen's University at Kingston (1988 rev. 2005).]]  J. R. Cordy I. H. Carmichael and R. Halliday The TXL Programming Language Queen's University at Kingston (1988 rev. 2005).]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCL.1990.63770"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0096-0551(91)90019-6"},{"volume-title":"Proc. CASCON'92","year":"1992","author":"Cordy J. R.","key":"e_1_3_2_1_11_1"},{"journal-title":"Journal of Information and Software Technology44(13), 827--837 (","year":"2002","author":"Cordy J. R.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/876902.881307"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972779"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025801405075"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2363.2433"},{"volume-title":"Proc. DIMACS Workshop on Partial-Order Methods in Verification","year":"1996","author":"Godefroid P.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2003.1238041"},{"key":"e_1_3_2_1_19_1","unstructured":"C. Halpern \"TXL: A Rapid Prototyping Tool for Programming Language Design\" M.Sc. thesis Department of Computer Science University of Toronto (1986).]]  C. Halpern \"TXL: A Rapid Prototyping Tool for Programming Language Design\" M.Sc. thesis Department of Computer Science University of Toronto (1986).]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/53580.53581"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551188_65"},{"volume-title":"Proc. CASCON '92, IBM Center for Advanced Studies 1992 Conference, 201--214","year":"1992","author":"Lamb D. A.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"A. J. Malton \"The Denotational Semantics of a Functional Tree Manipulation Language\" Computer Languages19(3) 157--168 (1993).]]  A. J. Malton \"The Denotational Semantics of a Functional Tree Manipulation Language\" Computer Languages19(3) 157--168 (1993).]]","DOI":"10.1016\/0096-0551(93)90031-U"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250705"},{"volume-title":"Proc. 6th International Conference on Programming Language Implementation and Logic Programming, Lecture Notes in Computer Science844","year":"1991","author":"Paige R.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"R. Paige \"APTS External Specification Manual\" Unpublished manuscript available at http:\/\/www.cs.nyu.edu\/jessie (1993).]]  R. Paige \"APTS External Specification Manual\" Unpublished manuscript available at http:\/\/www.cs.nyu.edu\/jessie (1993).]]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/128749.128752"},{"volume-title":"Proc. 2nd Annual Conference on Privacy, Security and Trust","year":"2004","author":"Tal O.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"M. Tomita \"An Efficient Augmented Context-free Parsing Algorithm\" Computational Linguistics13(1--2) 31--46 (1987).]]   M. Tomita \"An Efficient Augmented Context-free Parsing Algorithm\" Computational Linguistics13(1--2) 31--46 (1987).]]"},{"volume-title":"Proc. Rewriting Techniques and Applications (RTA'01)","year":"2051","author":"Visser E.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"E.\n       \n      Visser \"Program Transformation in Stratego\/XT\n      \n  \n  : \n  Rules Strategies Tools and Systems in Stratego XT\/0.9\" Proc. Domain Specific Program Generation\n   \n  2003 Lecture Notes in Computer Science\n  3016 216--238 (2004).]]  E. Visser \"Program Transformation in Stratego\/XT: Rules Strategies Tools and Systems in Stratego XT\/0.9\" Proc. Domain Specific Program Generation 2003 Lecture Notes in Computer Science3016 216--238 (2004).]]","DOI":"10.1007\/978-3-540-25935-0_13"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1046157"}],"event":{"name":"PEPM06: Partial Evaluation and Program Manipulation 2006","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Charleston South Carolina","acronym":"PEPM06"},"container-title":["Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111542.1111544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1111542.1111544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:23Z","timestamp":1750262903000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111542.1111544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1,9]]},"references-count":32,"alternative-id":["10.1145\/1111542.1111544","10.1145\/1111542"],"URL":"https:\/\/doi.org\/10.1145\/1111542.1111544","relation":{},"subject":[],"published":{"date-parts":[[2006,1,9]]},"assertion":[{"value":"2006-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}