{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:27:47Z","timestamp":1730316467824,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2384592.2384609","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T12:07:05Z","timestamp":1350907625000},"page":"179-194","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Managed data"],"prefix":"10.1145","author":[{"given":"Alex","family":"Loh","sequence":"first","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"given":"Tijs","family":"van der Storm","sequence":"additional","affiliation":[{"name":"Centrum Wiskunde & Informatica (CWI), Amsterdam, Netherlands"}]},{"given":"William R.","family":"Cook","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Java Programming Language","author":"Arnold Ken","year":"2005","unstructured":"Ken Arnold , James Gosling , and David Holmes . The Java Programming Language . Addison-Wesley Professional , 4 th edition, 2005 . Ken Arnold, James Gosling, and David Holmes. The Java Programming Language. Addison-Wesley Professional, 4th edition, 2005.","edition":"4"},{"key":"e_1_3_2_1_2_1","volume-title":"Java persistence with Hibernate","author":"Bauer Christian","year":"2006","unstructured":"Christian Bauer and Gavin King . Java persistence with Hibernate . Manning Publications Co. , second edition, 2006 . Christian Bauer and Gavin King. Java persistence with Hibernate. Manning Publications Co., second edition, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/320434.320440"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(84)90004-2"},{"key":"e_1_3_2_1_5_1","volume-title":"Policy-based authorization. (Unpublished manuscript)","author":"Cook William R.","year":"2003","unstructured":"William R. Cook . Policy-based authorization. (Unpublished manuscript) , 2003 . William R. Cook. Policy-based authorization. (Unpublished manuscript), 2003."},{"key":"e_1_3_2_1_6_1","unstructured":"Oracle Corporation. Proxy (Java 2 Platform SE v1.4.2). http:\/\/docs.oracle.com\/javase\/1.3\/docs\/guide\/reflection\/proxy.html. Oracle Corporation. Proxy (Java 2 Platform SE v1.4.2). http:\/\/docs.oracle.com\/javase\/1.3\/docs\/guide\/reflection\/proxy.html."},{"key":"e_1_3_2_1_7_1","volume-title":"JavaScript: The Definitive Guide. O'Reilly & Associates","author":"Flanagan David","year":"1998","unstructured":"David Flanagan . JavaScript: The Definitive Guide. O'Reilly & Associates , Inc ., 3 rd edition, 1998 . David Flanagan. JavaScript: The Definitive Guide. O'Reilly & Associates, Inc., 3rd edition, 1998.","edition":"3"},{"key":"e_1_3_2_1_8_1","volume-title":"Design patterns: elements of reusable object-oriented software","author":"Gamma Erich","year":"1995","unstructured":"Erich Gamma , Richard Helm , Ralph Johnson , and John Vlissides . Design patterns: elements of reusable object-oriented software . Addison-Wesley Longman Publishing Co., Inc. , 1995 . Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc., 1995."},{"key":"e_1_3_2_1_9_1","volume-title":"Smalltalk-80: the language and its implementation","author":"Goldberg Adele","year":"1983","unstructured":"Adele Goldberg and David Robson . Smalltalk-80: the language and its implementation . Addison-Wesley Longman Publishing Co., Inc. , 1983 . Adele Goldberg and David Robson. Smalltalk-80: the language and its implementation. Addison-Wesley Longman Publishing Co., Inc., 1983."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/509252.509264"},{"key":"e_1_3_2_1_11_1","first-page":"399 2","volume-title":"Proceedings of the European Conference on Object-Oriented Programming (ECOOP)","volume":"4609","author":"Huang Shan","year":"2007","unstructured":"Shan Huang , David Zook , and Yannis Smaragdakis . Morphing : Safely shaping a class in the image of others . In Proceedings of the European Conference on Object-Oriented Programming (ECOOP) , volume 4609 , pages 399 -- 424 . Springer Berlin \/ Heidelberg , 2007 . 10.1007\/978-3-540-73589- 2 - 19 . Shan Huang, David Zook, and Yannis Smaragdakis. Morphing: Safely shaping a class in the image of others. In Proceedings of the European Conference on Object-Oriented Programming (ECOOP), volume 4609, pages 399--424. Springer Berlin \/ Heidelberg, 2007. 10.1007\/978-3-540-73589-2-19."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/130697.130699"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/500806"},{"key":"e_1_3_2_1_14_1","volume-title":"Beyond the C++ Standard Library: An Introduction to Boost","author":"Karlsson Bjorn","year":"2005","unstructured":"Bjorn Karlsson . Beyond the C++ Standard Library: An Introduction to Boost . Addison-Wesley Professional , first edition, 2005 . Bjorn Karlsson. Beyond the C++ Standard Library: An Introduction to Boost. Addison-Wesley Professional, first edition, 2005."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/290229.290234"},{"key":"e_1_3_2_1_16_1","volume-title":"C Programming Language","author":"Kernighan Brian W.","year":"1988","unstructured":"Brian W. Kernighan and Dennis M. Ritchie . C Programming Language . Prentice Hall , 2 nd edition, 1988 . Brian W. Kernighan and Dennis M. Ritchie. C Programming Language. Prentice Hall, 2nd edition, 1988.","edition":"2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/574212"},{"key":"e_1_3_2_1_19_1","volume-title":"Programming Languages: Application and Interpretation","author":"Krishnamurthi Shriram","year":"2007","unstructured":"Shriram Krishnamurthi . Programming Languages: Application and Interpretation . April 2007 . Shriram Krishnamurthi. Programming Languages: Application and Interpretation. April 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/549659"},{"key":"e_1_3_2_1_21_1","volume-title":"Programming in Scala: A Comprehensive Step-by-Step Guide. Artima Incorporation","author":"Odersky Martin","year":"2011","unstructured":"Martin Odersky , Lex Spoon , and Bill Venners . Programming in Scala: A Comprehensive Step-by-Step Guide. Artima Incorporation , 2 nd edition, 2011 . Martin Odersky, Lex Spoon, and Bill Venners. Programming in Scala: A Comprehensive Step-by-Step Guide. Artima Incorporation, 2nd edition, 2011.","edition":"2"},{"key":"e_1_3_2_1_22_1","volume-title":"Object Management Group","author":"Meta Object OMG.","year":"2000","unstructured":"OMG. Meta Object Facility (MOF) Specification . Object Management Group , 2000 . OMG. Meta Object Facility (MOF) Specification. Object Management Group, 2000."},{"key":"e_1_3_2_1_23_1","volume-title":"Play Framework Cookbook","author":"Reelsen Alexander","year":"2011","unstructured":"Alexander Reelsen . Play Framework Cookbook . Packt Publishing , 2011 . Alexander Reelsen. Play Framework Cookbook. Packt Publishing, 2011."},{"key":"e_1_3_2_1_24_1","volume-title":"Common Lisp: The Language","author":"Steele Guy","year":"1990","unstructured":"Guy Steele . Common Lisp: The Language . Digital Press , 1990 . Guy Steele. Common Lisp: The Language. Digital Press, 1990."},{"key":"e_1_3_2_1_25_1","volume-title":"Common LISP: the language","author":"Steele Guy L.","year":"1990","unstructured":"Guy L. Steele , Jr. Common LISP: the language ( 2 nd ed.). Digital Press , 1990 . Guy L. Steele, Jr. Common LISP: the language (2nd ed.). Digital Press, 1990.","edition":"2"},{"key":"e_1_3_2_1_26_1","volume-title":"EMF: Eclipse Modeling Framework","author":"Steinberg Dave","year":"2008","unstructured":"Dave Steinberg , Frank Budinsky , Marcelo Paternostro , and Ed Merks . EMF: Eclipse Modeling Framework . Addison-Wesley Professional , second edition, 2008 . Dave Steinberg, Frank Budinsky, Marcelo Paternostro, and Ed Merks. EMF: Eclipse Modeling Framework. Addison-Wesley Professional, second edition, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.1"},{"key":"e_1_3_2_1_28_1","unstructured":"Don Syme Adam Granicz and Antonio Cisternino. Expert F# (Expert's Voice in .Net). Don Syme Adam Granicz and Antonio Cisternino. Expert F# (Expert's Voice in .Net)."},{"key":"e_1_3_2_1_29_1","volume-title":"Object-Oriented Programming Languages: Application and Interpretation","author":"Tanter \u00c9ric","year":"2010","unstructured":"\u00c9ric Tanter . Object-Oriented Programming Languages: Application and Interpretation . 2010 . \u00c9ric Tanter. Object-Oriented Programming Languages: Application and Interpretation. 2010."},{"key":"e_1_3_2_1_30_1","volume-title":"Programming Ruby: The Pragmatic Programmers' Guide","author":"Thomas Dave","year":"2008","unstructured":"Dave Thomas , Chad Fowler , and Andy Hunt . Programming Ruby: The Pragmatic Programmers' Guide . Addison-Wesley Professional , second edition, 2008 . Dave Thomas, Chad Fowler, and Andy Hunt. Programming Ruby: The Pragmatic Programmers' Guide. Addison-Wesley Professional, second edition, 2008."},{"key":"e_1_3_2_1_31_1","volume-title":"Pragmatic Bookshelf","author":"Thomas Dave","year":"2006","unstructured":"Dave Thomas , David Hansson , Leon Breedt , Mike Clark , James Duncan Davidson , Justin Gehtland , and Andreas Schwarz . Agile Web Development with Rails . Pragmatic Bookshelf , 2006 . Dave Thomas, David Hansson, Leon Breedt, Mike Clark, James Duncan Davidson, Justin Gehtland, and Andreas Schwarz. Agile Web Development with Rails. Pragmatic Bookshelf, 2006."},{"key":"e_1_3_2_1_32_1","volume-title":"The Python Language Reference Manual","author":"van Rossum Guido","year":"2006","unstructured":"Guido van Rossum . The Python Language Reference Manual . Network Theory Ltd , second edition, 2006 . Guido van Rossum. The Python Language Reference Manual. Network Theory Ltd, second edition, 2006."},{"key":"e_1_3_2_1_33_1","volume-title":"Ada language and methodology","author":"Watt David A.","year":"1987","unstructured":"David A. Watt , Brian A. Wichmann , and William Findlay . Ada language and methodology . Prentice Hall International (UK) Ltd ., 1987 . David A. Watt, Brian A. Wichmann, and William Findlay. Ada language and methodology. Prentice Hall International (UK) Ltd., 1987."},{"key":"e_1_3_2_1_34_1","volume-title":"Programming in MODULA-2 (3rd corrected ed.)","author":"Wirth Niklaus","year":"1985","unstructured":"Niklaus Wirth . Programming in MODULA-2 (3rd corrected ed.) . Springer-Verlag New York, Inc. , 1985 . Niklaus Wirth. Programming in MODULA-2 (3rd corrected ed.). Springer-Verlag New York, Inc., 1985."},{"key":"e_1_3_2_1_35_1","first-page":"3","volume-title":"Proceedings of the IFIP Conference on Software Architecture: System Design, Development and Maintenance","author":"Joseph","year":"2002","unstructured":"Joseph W. Yoder and Ralph E. Johnson. The adaptive object-model architectural style . In Proceedings of the IFIP Conference on Software Architecture: System Design, Development and Maintenance , pages 3 -- 27 . Kluwer, B.V. , 2002 . Joseph W. Yoder and Ralph E. Johnson. The adaptive object-model architectural style. In Proceedings of the IFIP Conference on Software Architecture: System Design, Development and Maintenance, pages 3--27. Kluwer, B.V., 2002."}],"event":{"name":"SPLASH '12: Conference on Systems, Programming, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Tucson Arizona USA","acronym":"SPLASH '12"},"container-title":["Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2384592.2384609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T16:39:24Z","timestamp":1673109564000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384592.2384609"}},"subtitle":["modular strategies for data abstraction"],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":35,"alternative-id":["10.1145\/2384592.2384609","10.1145\/2384592"],"URL":"https:\/\/doi.org\/10.1145\/2384592.2384609","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}