{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:41Z","timestamp":1750308941820,"version":"3.41.0"},"reference-count":3,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGACT News"],"published-print":{"date-parts":[[2006,9]]},"abstract":"<jats:p>\n            A recent SIGACT News Logic column, guest-written by James Cheney\n            <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"http:\/\/doi.acm.org\/10.1145\/1107523.1107537\">DOI =\n10.1145\/1107523.1107537<\/jats:ext-link>\n            , discussed nominal logic [1], an\napproach to abstract syntax with binding structure. In addition to\nproviding a worthy tutorial on nominal logic, that column leveled\nfive criticisms at higher-order abstract syntax, an alternative\napproach for dealing with binding structure in abstract syntax. We\nargue below that three of those criticisms are factually\ninaccurate, and the other two are misguided.\n          <\/jats:p>","DOI":"10.1145\/1165555.1165572","type":"journal-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:35:32Z","timestamp":1161210932000},"page":"93-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Higher-order abstract syntax"],"prefix":"10.1145","volume":"37","author":[{"given":"Karl","family":"Crary","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Robert","family":"Harper","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2006,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001650200016"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/138027.138060"},{"key":"e_1_2_1_3_1","volume-title":"Version 1.4","author":"Pfenning Frank","year":"2002","unstructured":"{3} Frank Pfenning and Carsten Sch\u00fcrmann . Twelf User's Guide , Version 1.4 , 2002 . Available electronically at http:\/\/www.cs.cmu.edu\/~twelf. {3} Frank Pfenning and Carsten Sch\u00fcrmann. Twelf User's Guide, Version 1.4, 2002. Available electronically at http:\/\/www.cs.cmu.edu\/~twelf."}],"container-title":["ACM SIGACT News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1165555.1165572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1165555.1165572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:37:05Z","timestamp":1750282625000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1165555.1165572"}},"subtitle":["setting the record straight"],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":3,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["10.1145\/1165555.1165572"],"URL":"https:\/\/doi.org\/10.1145\/1165555.1165572","relation":{},"ISSN":["0163-5700"],"issn-type":[{"type":"print","value":"0163-5700"}],"subject":[],"published":{"date-parts":[[2006,9]]},"assertion":[{"value":"2006-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}