{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:20Z","timestamp":1772164100773,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,4]],"date-time":"2016-09-04T00:00:00Z","timestamp":1472947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/K034413\/1"],"award-info":[{"award-number":["EP\/K034413\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,4]]},"DOI":"10.1145\/2951913.2951925","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T08:17:16Z","timestamp":1472458636000},"page":"448-461","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["The best of both worlds: linear functional programming without compromise"],"prefix":"10.1145","author":[{"given":"J. Garrett","family":"Morris","sequence":"first","affiliation":[{"name":"University of Edinburgh, UK"}]}],"member":"320","published-online":{"date-parts":[[2016,9,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086365.1086376"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1017\/S095679680900728X"},{"key":"e_1_3_2_1_4_1","first-page":"72","volume-title":"10th International Symposium, SAS 2003, San Diego, CA, USA, June 11-13, 2003","author":"Boyland J.","year":"2003","unstructured":"J. Boyland . Checking interference with fractional permissions. In Static Analysis , 10th International Symposium, SAS 2003, San Diego, CA, USA, June 11-13, 2003 , Proceedings , pages 55\u2013 72 , 2003 . J. Boyland. Checking interference with fractional permissions. In Static Analysis, 10th International Symposium, SAS 2003, San Diego, CA, USA, June 11-13, 2003, Proceedings, pages 55\u201372, 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1887654.1887670"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263708"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512532"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/143165.143174"},{"key":"e_1_3_2_1_9_1","first-page":"48","volume-title":"Proceedings Third International Workshop on Linearity, LINEARITY 2014","author":"Gan E.","year":"2014","unstructured":"E. Gan , J. A. Tov , and G. Morrisett . Type classes for lightweight substructural types . In Proceedings Third International Workshop on Linearity, LINEARITY 2014 , Vienna, Austria, 13th July , 2014 , pages 34\u2013 48 , 2014. E. Gan, J. A. Tov, and G. Morrisett. Type classes for lightweight substructural types. In Proceedings Third International Workshop on Linearity, LINEARITY 2014, Vienna, Austria, 13th July, 2014, pages 34\u201348, 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796809990268"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(87)90045-4"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","first-page":"157","volume-title":"Implementation of Functional Languages, 12th International Workshop, IFL","author":"Gustavsson J.","year":"2000","unstructured":"J. Gustavsson and J. Svenningsson . A usage analysis with bounded usage polymorphism and subtyping . In M. Mohnen and P. W. M. Koopman, editors, Implementation of Functional Languages, 12th International Workshop, IFL 2000 , Aachen, Germany, September 4- 7, 2000, Selected Papers , volume 2011 of Lecture Notes in Computer Science , pages 140\u2013 157 . Springer, 2000. J. Gustavsson and J. Svenningsson. A usage analysis with bounded usage polymorphism and subtyping. In M. Mohnen and P. W. M. Koopman, editors, Implementation of Functional Languages, 12th International Workshop, IFL 2000, Aachen, Germany, September 4- 7, 2000, Selected Papers, volume 2011 of Lecture Notes in Computer Science, pages 140\u2013157. Springer, 2000."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1990.113759"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1291151.1291189"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-011-9079-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646728.703349"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511663086","volume-title":"Qualified Types: Theory and Practice","author":"Jones M. P.","year":"1994","unstructured":"M. P. Jones . Qualified Types: Theory and Practice . Cambridge University Press , 1994 . M. P. Jones. Qualified Types: Theory and Practice. Cambridge University Press, 1994."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/224164.224198"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263765"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/645394.651909"},{"key":"e_1_3_2_1_21_1","volume-title":"6th European Symposium on Programming","volume":"1058","author":"Launchbury J.","year":"1996","unstructured":"J. Launchbury and R. Paterson . Parametricity and unboxing with unpointed types. In H. R. Nielson, editor, Programming Languages and Systems - ESOP\u201996 , 6th European Symposium on Programming , Link\u00f6ping, Sweden , April 22-24, 1996 , Proceedings, volume 1058 of Lecture Notes in Computer Science, pages 204\u2013218. Springer, 1996. J. Launchbury and R. Paterson. Parametricity and unboxing with unpointed types. In H. R. Nielson, editor, Programming Languages and Systems - ESOP\u201996, 6th European Symposium on Programming, Link\u00f6ping, Sweden, April 22-24, 1996, Proceedings, volume 1058 of Lecture Notes in Computer Science, pages 204\u2013218. Springer, 1996."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/291891.291892"},{"key":"e_1_3_2_1_23_1","volume-title":"ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings","volume":"9032","author":"Lindley S.","year":"2015","unstructured":"S. Lindley and J. G. Morris . A semantics for propositions as sessions. In J. Vitek, editor, Programming Languages and Systems - 24th European Symposium on Programming , ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings , volume 9032 of Lecture Notes in Computer Science, pages 560\u2013584. Springer , 2015 . S. Lindley and J. G. Morris. A semantics for propositions as sessions. In J. Vitek, editor, Programming Languages and Systems - 24th European Symposium on Programming, ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings, volume 9032 of Lecture Notes in Computer Science, pages 560\u2013584. Springer, 2015."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1708016.1708027"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"J. G. Morris. The best of both worlds: Linear functional programming without compromise (extended version). http:\/\/homepages.inf. ed.ac.uk\/jmorri14\/ 2016.  J. G. Morris. The best of both worlds: Linear functional programming without compromise (extended version). http:\/\/homepages.inf. ed.ac.uk\/jmorri14\/ 2016.","DOI":"10.1145\/2951913.2951925"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11417170_22"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/421090"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628136.2628160"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411286.1411290"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/512760.512766"},{"key":"e_1_3_2_1_31_1","volume-title":"International Workshop","volume":"776","author":"Smetsers S.","year":"1993","unstructured":"S. Smetsers , E. Barendsen , M. C. J. D. van Eekelen , and M. J. Plasmeijer . Guaranteeing safe destructive updates through a type system with uniqueness information for graphs. In H. J. Schneider and H. Ehrig, editors, Graph Transformations in Computer Science , International Workshop , Dagstuhl Castle, Germany , January 1993 , Proceedings, volume 776 of Lecture Notes in Computer Science, pages 358\u2013379. Springer, 1993. S. Smetsers, E. Barendsen, M. C. J. D. van Eekelen, and M. J. Plasmeijer. Guaranteeing safe destructive updates through a type system with uniqueness information for graphs. In H. J. Schneider and H. Ehrig, editors, Graph Transformations in Computer Science, International Workshop, Dagstuhl Castle, Germany, January 1993, Proceedings, volume 776 of Lecture Notes in Computer Science, pages 358\u2013379. Springer, 1993."},{"key":"e_1_3_2_1_32_1","series-title":"Lecture Notes in Computer Science","first-page":"381","volume-title":"Programming Languages and Systems, 9th European Symposium on Programming, ESOP","author":"Smith F.","year":"2000","unstructured":"F. Smith , D. Walker , and J. G. Morrisett . Alias types . In G. Smolka, editor, Programming Languages and Systems, 9th European Symposium on Programming, ESOP 2000 , Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings , volume 1782 of Lecture Notes in Computer Science , pages 366\u2013 381 . Springer, 2000. F. Smith, D. Walker, and J. G. Morrisett. Alias types. In G. Smolka, editor, Programming Languages and Systems, 9th European Symposium on Programming, ESOP 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings, volume 1782 of Lecture Notes in Computer Science, pages 366\u2013381. Springer, 2000."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926436"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.06.028"},{"key":"e_1_3_2_1_35_1","first-page":"210","volume-title":"18th International Symposium, MFCS\u201993, Gdansk, Poland, August 30 - September 3, 1993","author":"Wadler P.","year":"1993","unstructured":"P. Wadler . A taste of linear logic. In Mathematical Foundations of Computer Science 1993 , 18th International Symposium, MFCS\u201993, Gdansk, Poland, August 30 - September 3, 1993 , Proceedings , pages 185\u2013 210 , 1993 . P. Wadler. A taste of linear logic. In Mathematical Foundations of Computer Science 1993, 18th International Symposium, MFCS\u201993, Gdansk, Poland, August 30 - September 3, 1993, Proceedings, pages 185\u2013210, 1993."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1017\/S095679681400001X"},{"key":"e_1_3_2_1_37_1","volume-title":"Advanced Topics in Types and Programming Languages","author":"Walker D.","year":"2004","unstructured":"D. Walker . Substructural type systems. In B. C. Pierce, editor, Advanced Topics in Types and Programming Languages , chapter 1. The MIT Press , 2004 . D. Walker. Substructural type systems. In B. C. Pierce, editor, Advanced Topics in Types and Programming Languages, chapter 1. The MIT Press, 2004."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/363911.363923"}],"event":{"name":"ICFP'16: ACM SIGPLAN International Conference on Functional Programming","location":"Nara Japan","acronym":"ICFP'16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2951913.2951925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2951913.2951925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:39:37Z","timestamp":1750203577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2951913.2951925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,4]]},"references-count":37,"alternative-id":["10.1145\/2951913.2951925","10.1145\/2951913"],"URL":"https:\/\/doi.org\/10.1145\/2951913.2951925","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3022670.2951925","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,9,4]]},"assertion":[{"value":"2016-09-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}