{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:03Z","timestamp":1763468163041,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T00:00:00Z","timestamp":1379289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,9,16]]},"DOI":"10.1145\/2505879.2505903","type":"proceedings-article","created":{"date-parts":[[2013,9,17]],"date-time":"2013-09-17T19:57:05Z","timestamp":1379447825000},"page":"73-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A parameterized graph transformation calculus for finite graphs with monadic branches"],"prefix":"10.1145","author":[{"given":"Kazuyuki","family":"Asada","sequence":"first","affiliation":[{"name":"The University of Tokyo"}]},{"given":"Soichiro","family":"Hidaka","sequence":"additional","affiliation":[{"name":"National Institute of Informatics"}]},{"given":"Hiroyuki","family":"Kato","sequence":"additional","affiliation":[{"name":"National Institute of Informatics"}]},{"given":"Zhenjiang","family":"Hu","sequence":"additional","affiliation":[{"name":"National Institute of Informatics"}]},{"given":"Keisuke","family":"Nakano","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications"}]}],"member":"320","published-online":{"date-parts":[[2013,9,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129506005706"},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"189","volume-title":"ADBIS","author":"Bencz\u00far A. A.","year":"2004","unstructured":"A. A. Bencz\u00far and B. K\u00f3sa . Static analysis of structural recursion in semistructured databases and its consequences . In ADBIS , volume 3255 of LNCS , pages 189 -- 203 . Springer , 2004 . A. A. Bencz\u00far and B. K\u00f3sa. Static analysis of structural recursion in semistructured databases and its consequences. In ADBIS, volume 3255 of LNCS, pages 189--203. Springer, 2004."},{"key":"e_1_3_2_1_4_1","first-page":"42","volume-title":"APPSEM 2000","author":"Benton N.","year":"2000","unstructured":"N. Benton , J. Hughes , and E. Moggi . Monads and effects. In In International Summer School on Applied Semantics , APPSEM 2000 , pages 42 -- 122 . Springer-Verlag , 2000 . N. Benton, J. Hughes, and E. Moggi. Monads and effects. In In International Summer School on Applied Semantics, APPSEM 2000, pages 42--122. Springer-Verlag, 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2009.18"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050084"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364527.2364541"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237792"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02273-9_11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80563-2"},{"key":"e_1_3_2_1_13_1","unstructured":"I. Hasuo 2011. personal communication.  I. Hasuo 2011. personal communication."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500365.2500608"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863573"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2010.07.017"},{"key":"e_1_3_2_1_17_1","series-title":"LNCS","first-page":"506","volume-title":"CSL","author":"Kakutani Y.","year":"2002","unstructured":"Y. Kakutani . Duality between call-by-name recursion and call-by-value iteration . In CSL , volume 2471 of LNCS , pages 506 -- 521 . Springer , 2002 . Y. Kakutani. Duality between call-by-name recursion and call-by-value iteration. In CSL, volume 2471 of LNCS, pages 506--521. Springer, 2002."},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"3","article-title":"Structures defined by finite limits in the enriched context","volume":"23","author":"Kelly G. M.","year":"1982","unstructured":"G. M. Kelly . Structures defined by finite limits in the enriched context , I. Cahiers Topologie G\u00e9om. Diff\u00e9rentielle , 23 ( 1 ): 3 -- 42 , 1982 . G. M. Kelly. Structures defined by finite limits in the enriched context, I. Cahiers Topologie G\u00e9om. Diff\u00e9rentielle, 23(1):3--42, 1982.","journal-title":"I. Cahiers Topologie G\u00e9om. Diff\u00e9rentielle"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31606-7_31"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2010.11"},{"key":"e_1_3_2_1_21_1","volume-title":"Communicating and Mobile Systems: the &pi;-calculus","author":"Milner R.","year":"1999","unstructured":"R. Milner . Communicating and Mobile Systems: the &pi;-calculus . Cambridge University Press , 1999 . R. Milner. Communicating and Mobile Systems: the &pi;-calculus. Cambridge University Press, 1999."},{"key":"e_1_3_2_1_22_1","volume-title":"Foundations for programming languages","author":"Mitchell J. C.","year":"1996","unstructured":"J. C. Mitchell . Foundations for programming languages . Foundation of computing series. MIT Press , 1996 . J. C. Mitchell. Foundations for programming languages. Foundation of computing series. MIT Press, 1996."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/77350.77353"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023064908962"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-008-9110-5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00056-6"},{"key":"e_1_3_2_1_27_1","series-title":"LNCS","first-page":"138","volume-title":"ICMT","author":"Sasano I.","year":"2011","unstructured":"I. Sasano , Z. Hu , S. Hidaka , K. Inaba , H. Kato , and K. Nakano . Toward bidirectionalization of ATL with GRoundTram . In ICMT , volume 6707 of LNCS , pages 138 -- 151 . Springer , 2011 . I. Sasano, Z. Hu, S. Hidaka, K. Inaba, H. Kato, and K. Nakano. Toward bidirectionalization of ATL with GRoundTram. In ICMT, volume 6707 of LNCS, pages 138--151. Springer, 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2010.09.007"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/788022.788996"}],"event":{"name":"PPDP '13: 15th International Symposium on Principles and Practice of Declarative Programming","sponsor":["Universidad Complutense de Madrid","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Madrid Spain","acronym":"PPDP '13"},"container-title":["Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2505879.2505903","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2505879.2505903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:17Z","timestamp":1750232057000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2505879.2505903"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,16]]},"references-count":27,"alternative-id":["10.1145\/2505879.2505903","10.1145\/2505879"],"URL":"https:\/\/doi.org\/10.1145\/2505879.2505903","relation":{},"subject":[],"published":{"date-parts":[[2013,9,16]]},"assertion":[{"value":"2013-09-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}