{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T09:50:46Z","timestamp":1699782646414},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"8","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGPLAN Not."],"published-print":{"date-parts":[[1975,8]]},"abstract":"Although the if-then-else construct for flow of control is simple in some senses, and certainly superior to unrestricted GO TO logic, the indefinite replication of this structure leads to undesireable program constructs. Other, more extensible control structures may be added to programming languages, while regulating the unrestricted use of if-then-else, in such a way as to reduce the complexity of programs.<\/jats:p>","DOI":"10.1145\/956028.956032","type":"journal-article","created":{"date-parts":[[2005,11,14]],"date-time":"2005-11-14T18:08:27Z","timestamp":1131991707000},"page":"34-44","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["IF-THEN-ELSE considered harmful"],"prefix":"10.1145","volume":"10","author":[{"given":"Gerald M.","family":"Weinberg","sequence":"first","affiliation":[{"name":"State University of New York, Binghamton, New York"}]},{"given":"Dennis P.","family":"Geller","sequence":"additional","affiliation":[{"name":"State University of New York, Binghamton, New York"}]},{"given":"Thomas W. S.","family":"Plum","sequence":"additional","affiliation":[{"name":"State University of New York, Binghamton, New York"}]}],"member":"320","published-online":{"date-parts":[[1975,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_2_1_2_1","volume-title":"Mass.: Harvard U. Press","author":"Wason P. C.","year":"1972"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/362929.362947"},{"key":"e_1_2_1_4_1","unstructured":"Weinberg G. M. M. Goetz S. Wright and R. Kaufmann High Level COBOL Programming in press Weinberg G. M. M. Goetz S. Wright and R. Kaufmann High Level COBOL Programming in press"},{"key":"e_1_2_1_5_1","unstructured":"Plum Thomas W-S. \"Fooling the User of a Programming Language\" submitted to 1975 Conference on Reliable Software Plum Thomas W-S. \"Fooling the User of a Programming Language\" submitted to 1975 Conference on Reliable Software"},{"key":"e_1_2_1_6_1","unstructured":"Weinberg G. M. Dennis P. Geller and Thomas W-S. Plum \"DO WHILE Considered Harmful\" in preparation Weinberg G. M. Dennis P. Geller and Thomas W-S. Plum \"DO WHILE Considered Harmful\" in preparation"},{"key":"e_1_2_1_7_1","volume-title":"New York: McGraw-Hill","author":"Weinberg G. M.","year":"1970"}],"container-title":["ACM SIGPLAN Notices"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/956028.956032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T09:18:59Z","timestamp":1672737539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/956028.956032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1975,8]]},"references-count":7,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1975,8]]}},"alternative-id":["10.1145\/956028.956032"],"URL":"https:\/\/doi.org\/10.1145\/956028.956032","relation":{},"ISSN":["0362-1340","1558-1160"],"issn-type":[{"value":"0362-1340","type":"print"},{"value":"1558-1160","type":"electronic"}],"subject":[],"published":{"date-parts":[[1975,8]]},"assertion":[{"value":"1975-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}