{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:01Z","timestamp":1750308541947,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T00:00:00Z","timestamp":1377648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,28]]},"DOI":"10.1145\/2620678.2620684","type":"proceedings-article","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T19:32:56Z","timestamp":1414783976000},"page":"129-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The implementation of the Mezzo type-checker"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Protzenko","sequence":"first","affiliation":[{"name":"INRIA"}]}],"member":"320","published-online":{"date-parts":[[2013,8,28]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-642-25379-9_18"},{"key":"e_1_3_2_1_2_1","volume-title":"A Coq formalization of Mezzo, take","author":"Balabonski Thibaut","year":"2013","unstructured":"Thibaut Balabonski and Fran\u00e7ois Pottier . A Coq formalization of Mezzo, take 2, December 2013 . http:\/\/gallium.inria.fr\/~fpottier\/mezzo\/mezzo-coq.tar.gz. Thibaut Balabonski and Fran\u00e7ois Pottier. A Coq formalization of Mezzo, take 2, December 2013. http:\/\/gallium.inria.fr\/~fpottier\/mezzo\/mezzo-coq.tar.gz."},{"key":"e_1_3_2_1_3_1","volume-title":"Verification of Object-Oriented Software: The KeY Approach. LNCS 4334","author":"Beckert Bernhard","year":"2007","unstructured":"Bernhard Beckert , Reiner H\u00e4hnle , and Peter H. Schmitt , editors . Verification of Object-Oriented Software: The KeY Approach. LNCS 4334 . Springer-Verlag , 2007 . Bernhard Beckert, Reiner H\u00e4hnle, and Peter H. Schmitt, editors. Verification of Object-Oriented Software: The KeY Approach. LNCS 4334. Springer-Verlag, 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/11804192_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/11575467_5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1297027.1297050"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.5555\/1760267.1760273"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1480881.1480917"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1328438.1328469"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1863543.1863590"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1449764.1449782"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/978-3-540-30482-1_10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/512529.512563"},{"key":"e_1_3_2_1_14_1","volume-title":"Workshop on Higher-Order Programming and Effects (HOPE)","author":"Gu\u00e9neau Arma\u00ebl","year":"2013","unstructured":"Arma\u00ebl Gu\u00e9neau , Fran\u00e7ois Pottier , and Jonathan Protzenko . The ins and outs of iteration in Mezzo . Workshop on Higher-Order Programming and Effects (HOPE) , September 2013 . http:\/\/goo.gl\/NrgKc4. Arma\u00ebl Gu\u00e9neau, Fran\u00e7ois Pottier, and Jonathan Protzenko. The ins and outs of iteration in Mezzo. Workshop on Higher-Order Programming and Effects (HOPE), September 2013. http:\/\/goo.gl\/NrgKc4."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1411204.1411237"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1993498.1993563"},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-540-69738-1_18","volume-title":"Verification, Model Checking and Abstract Interpretation (VMCAI)","author":"Nguyen Huu Hai","year":"2007","unstructured":"Huu Hai Nguyen , Cristina David , Shengchao Qin , and Wei-Ngan Chin . Automated verification of shape and size properties via separation logic . In Verification, Model Checking and Abstract Interpretation (VMCAI) , volume 4349 of Lecture Notes in Computer Science , pages 251 -- 266 . Springer , 2007 . Huu Hai Nguyen, Cristina David, Shengchao Qin, and Wei-Ngan Chin. Automated verification of shape and size properties via separation logic. In Verification, Model Checking and Abstract Interpretation (VMCAI), volume 4349 of Lecture Notes in Computer Science, pages 251--266. Springer, 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2500365.2500598"},{"key":"e_1_3_2_1_19_1","first-page":"389","volume-title":"Advanced Topics in Types and Programming Languages","author":"Pottier Fran\u00e7ois","year":"2005","unstructured":"Fran\u00e7ois Pottier and Didier R\u00e9my . The essence of ML type inference . In Benjamin C. Pierce, editor, Advanced Topics in Types and Programming Languages , chapter 10, pages 389 -- 489 . MIT Press , 2005 . Fran\u00e7ois Pottier and Didier R\u00e9my. The essence of ML type inference. In Benjamin C. Pierce, editor, Advanced Topics in Types and Programming Languages, chapter 10, pages 389--489. MIT Press, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/645683.664578"},{"key":"e_1_3_2_1_21_1","volume-title":"Abstract Domains for the Static Analysis of Programs Manipulating Complex Data Structures. Habilitation \u00e0 diriger des recherches, \u00c9cole Normale Sup\u00e9rieure","author":"Rival Xavier","year":"2011","unstructured":"Xavier Rival . Abstract Domains for the Static Analysis of Programs Manipulating Complex Data Structures. Habilitation \u00e0 diriger des recherches, \u00c9cole Normale Sup\u00e9rieure , 2011 . Xavier Rival. Abstract Domains for the Static Analysis of Programs Manipulating Complex Data Structures. Habilitation \u00e0 diriger des recherches, \u00c9cole Normale Sup\u00e9rieure, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1932681.1863561"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-540-70545-1_36"}],"event":{"acronym":"IFL '13","name":"IFL '13: The 25th symposium on Implementation and Application of Functional Languages","location":"Nijmegen Netherlands"},"container-title":["Proceedings of the 25th symposium on Implementation and Application of Functional Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2620678.2620684","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2620678.2620684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:56:15Z","timestamp":1750272975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2620678.2620684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,28]]},"references-count":23,"alternative-id":["10.1145\/2620678.2620684","10.1145\/2620678"],"URL":"https:\/\/doi.org\/10.1145\/2620678.2620684","relation":{},"subject":[],"published":{"date-parts":[[2013,8,28]]},"assertion":[{"value":"2013-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}