{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T19:37:46Z","timestamp":1648669066960},"reference-count":15,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2008,11,1]],"date-time":"2008-11-01T00:00:00Z","timestamp":1225497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":1731,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1016\/j.entcs.2008.10.024","type":"journal-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T06:32:47Z","timestamp":1226385167000},"page":"3-22","source":"Crossref","is-referenced-by-count":2,"title":["A Parametric Calculus for Mobile Open Code"],"prefix":"10.1016","volume":"192","author":[{"given":"Davide","family":"Ancona","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Fagorzi","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Zucca","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.entcs.2008.10.024_bib001","series-title":"ACM Symp. on Principles of Programming Languages 2005","article-title":"Polymorphic bytecode: Compositional compilation for Java-like languages","author":"Ancona","year":"2005"},{"key":"10.1016\/j.entcs.2008.10.024_bib002","doi-asserted-by":"crossref","first-page":"5","DOI":"10.5381\/jot.2005.4.10.a1","article-title":"Safe and flexible objects with subtyping","volume":"10","author":"Bettini","year":"2005","journal-title":"Journ. of Object Technology"},{"key":"10.1016\/j.entcs.2008.10.024_bib003","series-title":"TCS'04 - 3rd IFIP Int. Conf. on Theoretical Computer Science 2004","first-page":"451","article-title":"Subtyping-inheritance conflicts: The mobile mixin case","author":"Bettini","year":"2004"},{"key":"10.1016\/j.entcs.2008.10.024_bib004","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s00236-005-0176-0","article-title":"MOMI: a calculus for mobile mixins","volume":"42","author":"Bettini","year":"2005","journal-title":"Acta Informatica"},{"key":"10.1016\/j.entcs.2008.10.024_bib005","series-title":"USE'03 - the Second International Workshop on Unanticipated Software Evolution","article-title":"Formalizing dynamic software updating (extended abstract)","author":"Bierman","year":"2003"},{"key":"10.1016\/j.entcs.2008.10.024_bib006","series-title":"Intl. Conf. on Functional Programming 2003","first-page":"99","article-title":"Dynamic rebinding for marshalling and update, with destruct-time \u03bb","author":"Bierman","year":"2003"},{"key":"10.1016\/j.entcs.2008.10.024_bib007","series-title":"Information and Computation","first-page":"172","article-title":"Inheritance as implicit coercion","author":"Breazu-Tannen","year":"1991"},{"key":"10.1016\/j.entcs.2008.10.024_bib008","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-540-75336-0_20","article-title":"A framework for type safe exchange of mobile code","volume":"4661","author":"Fagorzi","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"10.1016\/j.entcs.2008.10.024_bib009","series-title":"3rd Working Conference on the Formal Description of Programming Concepts","first-page":"193","article-title":"Control operators, the SECD-machine, and the lambda-calculus","author":"Felleisen","year":"1986"},{"key":"10.1016\/j.entcs.2008.10.024_bib010","series-title":"ACM Symp. on Principles of Programming Languages 1996","first-page":"358","article-title":"Linearity and the pi-calculus","author":"Kobayashi","year":"1996"},{"key":"10.1016\/j.entcs.2008.10.024_bib011","series-title":"OOPSLA'04 Workshop on Revival of Dynamic Languages","article-title":"Static typing where possible, dynamic typing when needed: The end of the cold war between programming languages","author":"Meijer","year":"2004"},{"key":"10.1016\/j.entcs.2008.10.024_bib012","series-title":"ACM Symp. on Principles of Programming Languages 1997","first-page":"106","article-title":"Proof-carrying code","author":"Necula","year":"1997"},{"key":"10.1016\/j.entcs.2008.10.024_bib013","series-title":"Types and Programming Languages","author":"Pierce","year":"2002"},{"key":"10.1016\/j.entcs.2008.10.024_bib014","series-title":"Proceedings 8th IEEE Logics in Computer Science","first-page":"376","article-title":"Typing and subtyping for mobile processes","author":"Pierce","year":"1993"},{"key":"10.1016\/j.entcs.2008.10.024_bib015","series-title":"ACM Symp. on Principles of Programming Languages 2005","first-page":"183","article-title":"Mutatis mutandis: safe and predictable dynamic software updating","author":"Stoyle","year":"2005"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066108004180?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066108004180?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,24]],"date-time":"2018-12-24T14:26:47Z","timestamp":1545661607000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066108004180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,11]]}},"alternative-id":["S1571066108004180"],"URL":"https:\/\/doi.org\/10.1016\/j.entcs.2008.10.024","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2008,11]]}}}