{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:32Z","timestamp":1750306652071,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T00:00:00Z","timestamp":1406505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,28]]},"DOI":"10.1145\/2633301.2633307","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T13:21:45Z","timestamp":1406553705000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Why inheritance anomaly is not worth solving"],"prefix":"10.1145","author":[{"given":"Vincent","family":"Gramoli","sequence":"first","affiliation":[{"name":"NICTA and The University of Sydney"}]},{"given":"Andrew E.","family":"Santosa","sequence":"additional","affiliation":[{"name":"Oracle Labs Australia"}]}],"member":"320","published-online":{"date-parts":[[2014,7,28]]},"reference":[{"volume-title":"Addison-Wesley","year":"1991","author":"Atkinson C.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1996.0088"},{"volume-title":"Proc. ICSE 2000 (2nd) Workshop on Multidimensional Separation of Concerns","year":"2000","author":"Bergmans L.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:12"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/74877.74922"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646155.679707"},{"key":"e_1_3_2_1_7_1","first-page":"504","volume-title":"4th OOIS","author":"Cugola G.","year":"1997"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/199873.199881"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781169"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/249233"},{"volume-title":"Addison Wesley Longman","year":"1994","author":"Gamma E.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-010-0150-5"},{"volume-title":"Addison-Wesley","year":"2005","author":"Goetz B.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370256.1370270"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42414"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/161468.161469"},{"key":"e_1_3_2_1_17_1","unstructured":"D. Holmes. Java: Concurrency synchronization and inheritance. http:\/\/www.mri.mq.edu.au\/~dholmes\/java-concurrency.html accessed 1998 1998. D. Holmes. Java: Concurrency synchronization and inheritance. http:\/\/www.mri.mq.edu.au\/~dholmes\/java-concurrency.html accessed 1998 1998."},{"volume-title":"JavaWorld","year":"2003","author":"Holub A.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01746517"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/32.4.297"},{"volume-title":"Queensland University of Technology","year":"2010","author":"Kent S. D.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/197320.197383"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35182-2_3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"107","DOI":"10.7551\/mitpress\/2087.003.0007","volume-title":"Research directions in concurrent object-oriented programming","author":"Matsuoka S.","year":"1993"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/646774.705717"},{"key":"e_1_3_2_1_27_1","unstructured":"B. Meyer. Object-Oriented Software Construction. Prentice Hall PTR 2nd edition 1996. B. Meyer. Object-Oriented Software Construction . Prentice Hall PTR 2nd edition 1996."},{"volume-title":"Proceedings of OOPSLA '89","year":"1989","author":"Meyrowitz N.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1064184.1064192"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0096-0551(96)00002-1"},{"key":"e_1_3_2_1_33_1","series-title":"LNCS","first-page":"118","volume-title":"5th ECOOP","author":"Neusius C.","year":"1991"},{"volume-title":"Prentice Hall","year":"1995","author":"Papathomas M.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486826"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.06.012"},{"key":"e_1_3_2_1_37_1","first-page":"586","volume-title":"10th PDCS","author":"Santosa A. E.","year":"1998"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048073"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1147954.1147958"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"e_1_3_2_1_41_1","first-page":"541","volume-title":"TENCON '94","volume":"2","author":"Thomas L.","year":"1995"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/74877.74889"}],"event":{"name":"ECOOP '14: European Conference on Object-Oriented Programming","sponsor":["Uppsala University, Department of Information Science Uppsala University, Department of Information Science","AITO Assoc Internationale por les Technologies Objects","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Uppsala Sweden","acronym":"ECOOP '14"},"container-title":["Proceedings of the 9th International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems PLE"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2633301.2633307","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2633301.2633307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:11Z","timestamp":1750229771000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2633301.2633307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,28]]},"references-count":39,"alternative-id":["10.1145\/2633301.2633307","10.1145\/2633301"],"URL":"https:\/\/doi.org\/10.1145\/2633301.2633307","relation":{},"subject":[],"published":{"date-parts":[[2014,7,28]]},"assertion":[{"value":"2014-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}