{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:23Z","timestamp":1772164043231,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,9]],"date-time":"2012-09-09T00:00:00Z","timestamp":1347148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,9]]},"DOI":"10.1145\/2364527.2364579","type":"proceedings-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T09:01:27Z","timestamp":1347440487000},"page":"365-376","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Functional programs that explain their work"],"prefix":"10.1145","author":[{"given":"Roly","family":"Perera","sequence":"first","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom &amp; MPI-SWS, Kaiserslautern, Germany"}]},{"given":"Umut A.","family":"Acar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA &amp; MPI-SWS, Kaiserslautern, Germany"}]},{"given":"James","family":"Cheney","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Paul Blain","family":"Levy","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2012,9,9]]},"reference":[{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28641-4_22"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/567067.567085"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972711"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646902.710193"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057978"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1412331.1412340"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_2_10_1","series-title":"LNCS","first-page":"208","volume-title":"ESOP","author":"Cirillo A.","year":"2008","unstructured":"A. Cirillo , R. Jagadeesan , C. Pitcher , and J. Riely . Tapido: Trust and authorization via provenance and integrity in distributed objects . In ESOP , volume 4960 of LNCS , pages 208 -- 223 , 2008 . A. Cirillo, R. Jagadeesan, C. Pitcher, and J. Riely. Tapido: Trust and authorization via provenance and integrity in distributed objects. In ESOP, volume 4960 of LNCS, pages 208--223, 2008."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44833-4_3"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376772"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376916.1376954"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1768933.1768947"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.41"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/168225"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/317636.317782"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-008-9023-7"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647372.724044"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"e_1_3_2_2_23_1","first-page":"160","volume-title":"IFL","author":"Sparud J.","year":"1997","unstructured":"J. Sparud and C. Runciman . Complete and partial redex trails of functional computations . In IFL 1997 , number 1467 in LNCS, pages 160 -- 177 . Springer-Verlag , 1998. J. Sparud and C. Runciman. Complete and partial redex trails of functional computations. In IFL 1997, number 1467 in LNCS, pages 160--177. Springer-Verlag, 1998."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646191.683713"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.29"},{"issue":"3","key":"e_1_3_2_2_26_1","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip F.","year":"1995","unstructured":"F. Tip . A survey of program slicing techniques . J. Prog. Lang. , 3 ( 3 ), 1995 . F. Tip. A survey of program slicing techniques. J. Prog. Lang., 3(3), 1995.","journal-title":"J. Prog. Lang."},{"key":"e_1_3_2_2_27_1","first-page":"439","volume-title":"ICSE","author":"Weiser M.","year":"1981","unstructured":"M. Weiser . Program slicing . In ICSE , pages 439 -- 449 , 1981 . M. Weiser. Program slicing. In ICSE, pages 439--449, 1981."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1050849.1050865"}],"event":{"name":"ICFP'12: ACM SIGPLAN International Conference on Functional Programming","location":"Copenhagen Denmark","acronym":"ICFP'12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 17th ACM SIGPLAN international conference on Functional programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2364527.2364579","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2364527.2364579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:34:00Z","timestamp":1750224840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2364527.2364579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,9]]},"references-count":25,"alternative-id":["10.1145\/2364527.2364579","10.1145\/2364527"],"URL":"https:\/\/doi.org\/10.1145\/2364527.2364579","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2398856.2364579","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,9,9]]},"assertion":[{"value":"2012-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}