{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:06:38Z","timestamp":1760043998810,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,1,13]],"date-time":"2015-01-13T00:00:00Z","timestamp":1421107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["600.065.120.10N126"],"award-info":[{"award-number":["600.065.120.10N126"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,1,13]]},"DOI":"10.1145\/2678015.2682541","type":"proceedings-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T13:51:05Z","timestamp":1418997065000},"page":"39-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Incremental Evaluation of Higher Order Attributes"],"prefix":"10.1145","author":[{"given":"Jeroen","family":"Bransen","sequence":"first","affiliation":[{"name":"Utrecht University, Utrecht, The Netherlands"}]},{"given":"Atze","family":"Dijkstra","sequence":"additional","affiliation":[{"name":"Utrecht University, Utrecht, The Netherlands"}]},{"given":"S. Doaitse","family":"Swierstra","sequence":"additional","affiliation":[{"name":"Utrecht University, Utrecht, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2015,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678015.2682543"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543728.2543735"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502488.2502490"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594304"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628136.2628150"},{"key":"e_1_3_2_1_6_1","volume-title":"First-class phantom types. Technical report","author":"Cheney J.","year":"2003","unstructured":"Cheney , J. and Hinze , R . ( 2003 ). First-class phantom types. Technical report , Cornell University . Cheney, J. and Hinze, R. (2003). First-class phantom types. Technical report, Cornell University."},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-319-07151-0_2","volume-title":"Functional and Logic Programming","author":"Claessen K.","year":"2014","unstructured":"Claessen , K. , Dureg\u00e5rd , J. , and Pa\u0142ka , M . ( 2014 ). Generating constrained random data with uniform distribution . In Codish, M. and Sumii, E., editors, Functional and Logic Programming , volume 8475 of Lecture Notes in Computer Science , pages 18 -- 34 . Springer International Publishing . Claessen, K., Dureg\u00e5rd, J., and Pa\u0142ka, M. (2014). Generating constrained random data with uniform distribution. In Codish, M. and Sumii, E., editors, Functional and Logic Programming, volume 8475 of Lecture Notes in Computer Science, pages 18--34. Springer International Publishing."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/357766.351266"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/582153.582176"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1596638.1596650"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(82)90030-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(02)00109-0"},{"issue":"2","key":"e_1_3_2_1_14_1","first-page":"127","article-title":"Semantics of context-free languages","volume":"2","author":"Knuth D. E.","year":"1968","unstructured":"Knuth , D. E. ( 1968 ). Semantics of context-free languages . Theory of Computing Systems , 2 ( 2 ): 127 -- 145 . Knuth, D. E. (1968). Semantics of context-free languages. Theory of Computing Systems, 2(2):127--145.","journal-title":"Theory of Computing Systems"},{"key":"e_1_3_2_1_15_1","volume-title":"Criterion: Robust, reliable performance measurement and analysis","author":"O'Sullivan B.","year":"2009","unstructured":"O'Sullivan , B. ( 2009 ). Criterion: Robust, reliable performance measurement and analysis . http:\/\/hackage.haskell.org\/package\/criterion. O'Sullivan, B. (2009). Criterion: Robust, reliable performance measurement and analysis. http:\/\/hackage.haskell.org\/package\/criterion."},{"key":"e_1_3_2_1_16_1","volume-title":"Haskell 98, Language and Libraries. The Revised Report","author":"Peyton Jones S. L.","year":"2003","unstructured":"Peyton Jones , S. L. ( 2003 ). Haskell 98, Language and Libraries. The Revised Report . Cambridge University Press . Journal of Functional Programming Special Issue 13(1). Peyton Jones, S. L. (2003). Haskell 98, Language and Libraries. The Revised Report. Cambridge University Press. Journal of Functional Programming Special Issue 13(1)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2166.357218"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647476.727632"},{"key":"e_1_3_2_1_19_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-642-19440-5_2","volume-title":"Malloy, B., Staab, S., and van den Brand","author":"S\u00f6derberg E.","year":"2011","unstructured":"S\u00f6derberg , E. and Hedin , G . ( 2011 ). Automated selective caching for reference attribute grammars . In Malloy, B., Staab, S., and van den Brand , M., editors, Software Language Engineering, volume 6563 of Lecture Notes in Computer Science , pages 2 -- 21 . Springer Berlin \/ Heidelberg . S\u00f6derberg, E. and Hedin, G. (2011). Automated selective caching for reference attribute grammars. In Malloy, B., Staab, S., and van den Brand, M., editors, Software Language Engineering, volume 6563 of Lecture Notes in Computer Science, pages 2--21. Springer Berlin \/ Heidelberg."},{"key":"e_1_3_2_1_20_1","first-page":"150","volume-title":"Advanced Functional Programming","author":"Swierstra S. D.","year":"1998","unstructured":"Swierstra , S. D. , Alcocer , P. R. A. , and Saraiva , J . ( 1998 ). Designing and Implementing Combinator Languages . In Advanced Functional Programming , pages 150 -- 206 . Swierstra, S. D., Alcocer, P. R. A., and Saraiva, J. (1998). Designing and Implementing Combinator Languages. In Advanced Functional Programming, pages 150--206."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.07.004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/73141.74830"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-54444-5_102"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604150"}],"event":{"name":"POPL '15: The 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Mumbai India","acronym":"POPL '15"},"container-title":["Proceedings of the 2015 Workshop on Partial Evaluation and Program Manipulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2678015.2682541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2678015.2682541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:52Z","timestamp":1750227172000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2678015.2682541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,13]]},"references-count":23,"alternative-id":["10.1145\/2678015.2682541","10.1145\/2678015"],"URL":"https:\/\/doi.org\/10.1145\/2678015.2682541","relation":{},"subject":[],"published":{"date-parts":[[2015,1,13]]},"assertion":[{"value":"2015-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}