{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:19Z","timestamp":1750307419133,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,15]],"date-time":"2010-09-15T00:00:00Z","timestamp":1284508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Pastramy project","award":["PTDC\/EIA\/72405\/2006"],"award-info":[{"award-number":["PTDC\/EIA\/72405\/2006"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,15]]},"DOI":"10.1145\/1852761.1852775","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"page":"89-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Memoization of methods using software transactional memory to track internal state dependencies"],"prefix":"10.1145","author":[{"given":"Hugo","family":"Rito","sequence":"first","affiliation":[{"name":"INESC-ID Lisboa\/Technical University of Lisbon"}]},{"given":"Jo\u00e3o","family":"Cachopo","sequence":"additional","affiliation":[{"name":"INESC-ID Lisboa\/Technical University of Lisbon"}]}],"member":"320","published-online":{"date-parts":[[2010,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186632.1186634"},{"volume-title":"Proc. of the Simp\u00f3sio de Inform\u00e1tica (INFO-RUM)","year":"2009","author":"Anjo I.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"}}E. Bruneton R. Lenglet and T. Coupaye. ASM: a code manipulation tool to implement adaptable systems. Adaptable and extensible component systems 2002.  }}E. Bruneton R. Lenglet and T. Coupaye. ASM: a code manipulation tool to implement adaptable systems. Adaptable and extensible component systems 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.05.009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/567532.567544"},{"key":"e_1_3_2_1_6_1","unstructured":"}}C. Franke Y. Niu and D. Zinn. Automated Discovery of Functional Aspects in Imperative Programs.  }}C. Franke Y. Niu and D. Zinn. Automated Discovery of Functional Aspects in Imperative Programs."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273029"},{"key":"e_1_3_2_1_8_1","first-page":"178","volume-title":"Proceedings of the Sixth International Symposium on Artificial Intelligence","author":"Hall M.","year":"1993"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040336"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/286385.286386"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/218019a0"},{"volume-title":"Technical University of Lisbon","year":"2009","author":"Rito H.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"82 2213","volume-title":"Precise Identification of Side-Effect-Free Methods in Java. In ICSM '04: Proceedings of the 20th IEEE International Conference on Software Maintenance","author":"Rountev A.","year":"2004"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/224964.224987"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251548"},{"volume-title":"Workshop on Declarative Aspects of Multicore Programming","year":"2008","author":"Ziarek L.","key":"e_1_3_2_1_16_1"}],"event":{"name":"PPPJ '10: Principles and Practice of Programming in Java","sponsor":["Technical University of Vienna","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Vienna Austria","acronym":"PPPJ '10"},"container-title":["Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852761.1852775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1852761.1852775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:41Z","timestamp":1750246781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852761.1852775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,15]]},"references-count":16,"alternative-id":["10.1145\/1852761.1852775","10.1145\/1852761"],"URL":"https:\/\/doi.org\/10.1145\/1852761.1852775","relation":{},"subject":[],"published":{"date-parts":[[2010,9,15]]},"assertion":[{"value":"2010-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}