{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:42Z","timestamp":1772163942713,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,17]],"date-time":"2010-10-17T00:00:00Z","timestamp":1287273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,17]]},"DOI":"10.1145\/1869459.1869502","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T08:41:35Z","timestamp":1287477695000},"page":"520-538","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Homogeneous family sharing"],"prefix":"10.1145","author":[{"given":"Xin","family":"Qi","sequence":"first","affiliation":[{"name":"Facebook Inc., Palo Alto, CA, USA"}]},{"given":"Andrew C.","family":"Myers","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2168342.2168347"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/942800.943565"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094826"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/97945.97982"},{"key":"e_1_3_2_1_5_1","volume-title":"Safe static type checking with systems of mutually recursive classes and inheritance. Technical report","author":"Bruce Kim B.","year":"1997","unstructured":"}} Kim B. Bruce . Safe static type checking with systems of mutually recursive classes and inheritance. Technical report , Pomona College , 1997 . http:\/\/www.cs.pomona.edu\/ kim\/ftp\/RecJava.ps.gz. }}Kim B. Bruce. Safe static type checking with systems of mutually recursive classes and inheritance. Technical report, Pomona College, 1997. http:\/\/www.cs.pomona.edu\/ kim\/ftp\/RecJava.ps.gz."},{"key":"e_1_3_2_1_6_1","first-page":"523","volume-title":"European Conference on Object-Oriented Programming (ECOOP), number 1445 in Lecture Notes in Computer Science","author":"Bruce Kim B.","year":"1998","unstructured":"}} Kim B. Bruce , Martin Odersky , and Philip Wadler . A statically safe alternative to virtual types . In European Conference on Object-Oriented Programming (ECOOP), number 1445 in Lecture Notes in Computer Science , pages 523 -- 549 . Springer-Verlag , July 1998 . }}Kim B. Bruce, Martin Odersky, and Philip Wadler. A statically safe alternative to virtual types. In European Conference on Object-Oriented Programming (ECOOP), number 1445 in Lecture Notes in Computer Science, pages 523--549. Springer-Verlag, July 1998."},{"key":"e_1_3_2_1_7_1","volume-title":"ASM: A code manipulation tool to implement adaptable systems","author":"Bruneton Eric","year":"2002","unstructured":"}} Eric Bruneton , Romain Lenglet , and Thierry Coupaye . ASM: A code manipulation tool to implement adaptable systems , 2002 . http:\/\/asm.objectweb.org\/current\/asm-eng.pdf. }}Eric Bruneton, Romain Lenglet, and Thierry Coupaye. ASM: A code manipulation tool to implement adaptable systems, 2002. http:\/\/asm.objectweb.org\/current\/asm-eng.pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/645988.674177"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218563.1218578"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353181"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129500070043"},{"key":"e_1_3_2_1_12_1","first-page":"97","volume-title":"ICTCS","author":"Damiani Ferruccio","year":"2003","unstructured":"}} Ferruccio Damiani , Sophia Drossopoulou , and Paola Giannini . Refined effects for unanticipated object re-classification: FickleIII . In ICTCS , pages 97 -- 110 , 2003 . }}Ferruccio Damiani, Sophia Drossopoulou, and Paola Giannini. Refined effects for unanticipated object re-classification: FickleIII. In ICTCS, pages 97--110, 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646156.679845"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646158.680013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111062"},{"key":"e_1_3_2_1_17_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma Erich","year":"1994","unstructured":"}} Erich Gamma , Richard Helm , Ralph Johnson , and John Vlissides . Design Patterns: Elements of Reusable Object-Oriented Software . Addison Wesley , Reading, MA , 1994 . }}Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley, Reading, MA, 1994."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. Net Object Days","author":"Herrmann Stephan","year":"2002","unstructured":"}} Stephan Herrmann . Object teams : Improving modularity for crosscutting collaborations . In Proc. Net Object Days , 2002 . }}Stephan Herrmann. Object teams: Improving modularity for crosscutting collaborations. In Proc. Net Object Days, 2002."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646156.679844"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297037"},{"key":"e_1_3_2_1_21_1","volume-title":"Object Oriented Programming in the BETA Programming Language","author":"Madsen O. Lehrmann","year":"1993","unstructured":"}} O. Lehrmann Madsen , B. M\u00f8ller-Pedersen , and K. Nygaard . Object Oriented Programming in the BETA Programming Language . Addison-Wesley , June 1993 . }}O. Lehrmann Madsen, B. M\u00f8ller-Pedersen, and K. Nygaard. Object Oriented Programming in the BETA Programming Language. Addison-Wesley, June 1993."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/74877.74919"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/643603.643613"},{"key":"e_1_3_2_1_24_1","volume-title":"Software Architectures and Component Technology","author":"Mezini Mira","year":"2000","unstructured":"}} Mira Mezini , Linda Seiter , and Karl Lieberherr . Component integration with pluggable composite adapters . Software Architectures and Component Technology , 2000 . }}Mira Mezini, Linda Seiter, and Karl Lieberherr. Component integration with pluggable composite adapters. Software Architectures and Component Technology, 2000."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542479"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133991"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1711506.1711507"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1028986"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765931.1765947"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167476"},{"key":"e_1_3_2_1_31_1","volume-title":"Computer Science Dept.","author":"Nystrom Nathaniel","year":"2006","unstructured":"}} Nathaniel Nystrom , Xin Qi , and Andrew C. Myers . Nested intersection for scalable software composition. Technical report , Computer Science Dept. , Cornell University , September 2006 . http:\/\/www.cs.cornell.edu\/nystrom\/papers\/jet-tr.pdf. }}Nathaniel Nystrom, Xin Qi, and Andrew C. Myers. Nested intersection for scalable software composition. Technical report, Computer Science Dept., Cornell University, September 2006. http:\/\/www.cs.cornell.edu\/nystrom\/papers\/jet-tr.pdf."},{"key":"e_1_3_2_1_32_1","volume-title":"June","author":"Odersky Martin","year":"2004","unstructured":"}} Martin Odersky , Philippe Altherr , Vincent Cremet , Burak Emir , Sebastian Maneth , St\u00e9phane Micheloud , Nikolay Mihaylov , Michel Schinz , Erik Stenman , and Matthias Zenger . An overview of the Scala programming language , June 2004 . http:\/\/scala.epfl.ch\/docu\/files\/ScalaOverview.pdf. }}Martin Odersky, Philippe Altherr, Vincent Cremet, Burak Emir, Sebastian Maneth, St\u00e9phane Micheloud, Nikolay Mihaylov, Michel Schinz, Erik Stenman, and Matthias Zenger. An overview of the Scala programming language, June 2004. http:\/\/scala.epfl.ch\/docu\/files\/ScalaOverview.pdf."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094815"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/646159.680026"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1480881.1480890"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542508"},{"key":"e_1_3_2_1_37_1","volume-title":"Sharing classes between families: technical report. Technical report, Computing and Information Science","author":"Qi Xin","year":"2009","unstructured":"}} Xin Qi and Andrew C. Myers . Sharing classes between families: technical report. Technical report, Computing and Information Science , Cornell University , March 2009 . http:\/\/hdl.handle.net\/1813\/12141. }}Xin Qi and Andrew C. Myers. Sharing classes between families: technical report. Technical report, Computing and Information Science, Cornell University, March 2009. http:\/\/hdl.handle.net\/1813\/12141."},{"key":"e_1_3_2_1_38_1","volume-title":"Homogeneous family sharing: technical report. Technical report, Computing and Information Science","author":"Qi Xin","year":"2010","unstructured":"}} Xin Qi and Andrew C. Myers . Homogeneous family sharing: technical report. Technical report, Computing and Information Science , Cornell University , July 2010 . http:\/\/hdl.handle.net\/1813\/15845. }}Xin Qi and Andrew C. Myers. Homogeneous family sharing: technical report. Technical report, Computing and Information Science, Cornell University, July 2010. http:\/\/hdl.handle.net\/1813\/15845."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505148"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_20"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542478"},{"key":"e_1_3_2_1_43_1","first-page":"444","volume-title":"Proc. European Conference on Object-Oriented Programming (ECOOP), number 1241 in Lecture Notes in Computer Science","author":"Thorup Kresten Krab","year":"1997","unstructured":"}} Kresten Krab Thorup . Genericity in Java with virtual types . In Proc. European Conference on Object-Oriented Programming (ECOOP), number 1241 in Lecture Notes in Computer Science , pages 444 -- 471 . Springer-Verlag , 1997 . }}Kresten Krab Thorup. Genericity in Java with virtual types. In Proc. European Conference on Object-Oriented Programming (ECOOP), number 1241 in Lecture Notes in Computer Science, pages 444--471. Springer-Verlag, 1997."},{"key":"e_1_3_2_1_44_1","volume-title":"5th Workshop on Foundations of Object-Oriented Languages (FOOL)","author":"Torgersen Mads","year":"1998","unstructured":"}} Mads Torgersen . Virtual types are statically safe . In 5th Workshop on Foundations of Object-Oriented Languages (FOOL) , January 1998 . }}Mads Torgersen. Virtual types are statically safe. In 5th Workshop on Foundations of Object-Oriented Languages (FOOL), January 1998."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167477"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1093"}],"event":{"name":"SPLASH '10: Systems Programming Languages and Applications: Software for Humanity","location":"Reno\/Tahoe Nevada USA","acronym":"SPLASH '10","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the ACM international conference on Object oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1869459.1869502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1869459.1869502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:08:14Z","timestamp":1750234094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1869459.1869502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,17]]},"references-count":44,"alternative-id":["10.1145\/1869459.1869502","10.1145\/1869459"],"URL":"https:\/\/doi.org\/10.1145\/1869459.1869502","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1932682.1869502","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,10,17]]},"assertion":[{"value":"2010-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}