{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:51:14Z","timestamp":1768009874208,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2384592.2384597","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T12:07:05Z","timestamp":1350907625000},"page":"39-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Socio-PLT"],"prefix":"10.1145","author":[{"given":"Leo A.","family":"Meyerovich","sequence":"first","affiliation":[{"name":"University of California Berkeley, Berkeley, CA, USA"}]},{"given":"Ariel S.","family":"Rabkin","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Index of Python Enhancement Proposals. http:\/\/www.python.org\/dev\/peps\/. Index of Python Enhancement Proposals. http:\/\/www.python.org\/dev\/peps\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Scala improvement process. http:\/\/docs.scala-lang.org\/sips\/. Scala improvement process. http:\/\/docs.scala-lang.org\/sips\/."},{"key":"e_1_3_2_1_3_1","unstructured":"The Java Community Process. http:\/\/jcp.org\/. The Java Community Process. http:\/\/jcp.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"FAQ - The Go Programming Language. Online: http:\/\/golang.org\/doc\/go_faq.html Accessed April 2012. FAQ - The Go Programming Language. Online: http:\/\/golang.org\/doc\/go_faq.html Accessed April 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359579"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(84)90146-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958846"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1029004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0092070302250897"},{"key":"e_1_3_2_1_12_1","volume-title":"First Workshop on Programmable Models for Emerging Architecture","author":"Catanzaro B.","year":"2009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.55"},{"key":"e_1_3_2_1_14_1","unstructured":"M. Cline. Inheritance - multiple and virtual inheritance. Online: http:\/\/www.parashift.com\/c++-faq-lite\/multiple-inheritance.html 2011. M. Cline. Inheritance - multiple and virtual inheritance. Online: http:\/\/www.parashift.com\/c++-faq-lite\/multiple-inheritance.html 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Portfolio Hardcover","author":"Coburn P.","year":"2006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/366663.366704"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640133"},{"key":"e_1_3_2_1_18_1","unstructured":"L. M. Corporation. Joint Strike Fighter C++ Coding Standards. Online: http:\/\/www.scribd.com\/doc\/3969122\/Joint-Strike-Fighter-C-Coding-Standards December 2005. L. M. Corporation. Joint Strike Fighter C++ Coding Standards. Online: http:\/\/www.scribd.com\/doc\/3969122\/Joint-Strike-Fighter-C-Coding-Standards December 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/362929.362947"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124855"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_22_1","volume-title":"Computer Science Department","author":"Felleisen M.","year":"1986"},{"key":"e_1_3_2_1_23_1","unstructured":"R. Gabriel. The rise of \"worse is better\". Lisp: Good News Bad News How to Win Big 1991. R. Gabriel. The rise of \"worse is better\". Lisp: Good News Bad News How to Win Big 1991."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542528"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0048-7333(99)00092-X"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2307\/2131581"},{"key":"e_1_3_2_1_27_1","volume-title":"CAV Workshop on Exploiting Concurrency Efficiently and Correctly","author":"Godefroid P.","year":"2008"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"M. Granovetter. The strength of weak ties. American journal of sociology pages 1360--1380 1973. M. Granovetter. The strength of weak ties. American journal of sociology pages 1360--1380 1973.","DOI":"10.1086\/225469"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988739"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869536"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449715.1449732"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168627"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/106591299604900310"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358561"},{"key":"e_1_3_2_1_35_1","volume-title":"USA","author":"Hoare C. A. R.","year":"1973"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1238844.1238856"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/32.2.98"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1086\/230793"},{"key":"e_1_3_2_1_39_1","first-page":"20","volume-title":"First International Workshop on the Theory and Practice of Delimited Continuations (TPDC 2011","author":"James R.","year":"2011"},{"key":"e_1_3_2_1_40_1","unstructured":"Jonathan Shapiro. Retrospective thoughts on BitC. Mailing list message. Available online: http:\/\/www.coyotos.org\/pipermail\/bitc-dev\/2012-March\/003300.html March 2012. Jonathan Shapiro. Retrospective thoughts on BitC. Mailing list message. Available online: http:\/\/www.coyotos.org\/pipermail\/bitc-dev\/2012-March\/003300.html March 2012."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.82.11.1483"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-007-9008-y"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/363744.363749"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159876.1159887"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"B. Liblit. Cooperative Bug Isolation. PhD thesis UC Berkeley 2004. B. Liblit. Cooperative Bug Isolation. PhD thesis UC Berkeley 2004.","DOI":"10.1049\/ic:20040352"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/359763.359789"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353536.1346323"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2011.68"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/77.2.453"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1937117.1937124"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1162\/014892602320991383"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"M. McPherson L. Smith-Lovin and J. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology pages 415--444 2001. M. McPherson L. Smith-Lovin and J. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology pages 415--444 2001.","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297078"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640091"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"R. Milner. Logic for computable functions: description of a machine implementation. 1972. R. Milner. Logic for computable functions: description of a machine implementation. 1972.","DOI":"10.21236\/AD0785072"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.2307\/2111674"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462166.1462167"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250785"},{"key":"e_1_3_2_1_59_1","unstructured":"P. Norvig. Design patterns in dynamic programming. Object World 96(5) 1996. P. Norvig. Design patterns in dynamic programming. Object World 96(5) 1996."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.5.538.15204"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/795687.797801"},{"key":"e_1_3_2_1_62_1","volume-title":"In the Proceedings of the 22nd Annual Meeting of the Psychology of Programming Interest Group (PPIG)","author":"Parnin C.","year":"2010"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985446"},{"key":"e_1_3_2_1_64_1","unstructured":"S. Peyton Jones. Wearing the hair shirt: a retrospective on Haskell. Invited talk at POPL 206 2003. S. Peyton Jones. Wearing the hair shirt: a retrospective on Haskell. Invited talk at POPL 206 2003."},{"key":"e_1_3_2_1_65_1","unstructured":"T. A. Proebsting. Disruptive programming language technologies. Talk at MIT. (Slides available: http:\/\/ll2.ai.mit.edu\/talks\/proebsting.ppt) November 2002. T. A. Proebsting. Disruptive programming language technologies. Talk at MIT. (Slides available: http:\/\/ll2.ai.mit.edu\/talks\/proebsting.ppt) November 2002."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351243"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01019459"},{"key":"e_1_3_2_1_68_1","volume-title":"Free Press.","author":"Rogers E.","year":"1995"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1693453.1693462"},{"key":"e_1_3_2_1_70_1","volume-title":"Velocity Web Performance and Operations Conference","author":"Schurman E.","year":"2009"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"P. Senge. The fifth discipline: The art and practice of the learning organization: Book review. 1993. P. Senge. The fifth discipline: The art and practice of the learning organization: Book review. 1993.","DOI":"10.1037\/\/1061-4087.45.4.31"},{"key":"e_1_3_2_1_72_1","volume-title":"Harvard Business School Press","author":"Shapiro C.","year":"1999"},{"key":"e_1_3_2_1_73_1","volume-title":"Sparks of Innovation in Human-Computer Interaction","author":"Shneiderman B.","year":"1993"},{"key":"e_1_3_2_1_74_1","volume-title":"The MIT Press","author":"Smith M.","year":"1994"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1238844.1238848"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993514"},{"key":"e_1_3_2_1_77_1","volume-title":"Technical Report CS\/75\/1, Department of Computational Science","author":"Turner D. A.","year":"1975"},{"key":"e_1_3_2_1_78_1","unstructured":"A. van Straaten. RE: What's so cool about Scheme? http:\/\/people.csail.mit.edu\/gregs\/ll1-discuss-archive-html\/msg03277.html June 2003. A. van Straaten. RE: What's so cool about Scheme? http:\/\/people.csail.mit.edu\/gregs\/ll1-discuss-archive-html\/msg03277.html June 2003."},{"key":"e_1_3_2_1_79_1","volume-title":"North Holland Publishing Company","author":"van Wijngaarden A.","year":"1966"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945471"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/143165.143169"},{"key":"e_1_3_2_1_82_1","first-page":"209","volume-title":"The Logic Programming Paradigm: A","author":"Wadler P.","year":"1998"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233830"},{"key":"e_1_3_2_1_84_1","first-page":"10","volume-title":"Proceedings of the 2nd USENIX conference on Hot topics in cloud computing","author":"Zaharia M.","year":"2010"}],"event":{"name":"SPLASH '12: Conference on Systems, Programming, and Applications: Software for Humanity","location":"Tucson Arizona USA","acronym":"SPLASH '12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384592.2384597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2384592.2384597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:00:51Z","timestamp":1750276851000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384592.2384597"}},"subtitle":["principles for programming language adoption"],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":83,"alternative-id":["10.1145\/2384592.2384597","10.1145\/2384592"],"URL":"https:\/\/doi.org\/10.1145\/2384592.2384597","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}