iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/781131.781155
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:04:32Z","timestamp":1725750272156},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,5,9]]},"DOI":"10.1145\/781131.781155","type":"proceedings-article","created":{"date-parts":[[2004,4,19]],"date-time":"2004-04-19T17:18:43Z","timestamp":1082395123000},"page":"208-219","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["A provably sound TAL for back-end optimization"],"prefix":"10.1145","author":[{"given":"Juan","family":"Chen","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Andrew W.","family":"Appel","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Hai","family":"Fang","sequence":"additional","affiliation":[{"name":"Yale University"}]}],"member":"320","published-online":{"date-parts":[[2003,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645683.664579"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/871816.871860"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325727"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/504709.504712"},{"key":"e_1_3_2_1_5_1","first-page":"37","volume-title":"Foundations of Computer Security workshop","author":"Appel W.","year":"2002","unstructured":"Andrew~W. Appel, Neophytos Michael, Aaron Stump, and Roberto Virga. A trustworthy proof checker. In Iliano Cervesato, editor, Foundations of Computer Security workshop, pages 37--48. DIKU, July 2002. diku.dk\/publikationer\/tekniske.rapporter\/2002\/02-12.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/258948.258960"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349315"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604149"},{"volume-title":"Bell Laboratories","year":"1997","author":"George Lal","key":"e_1_3_2_1_11_1","unstructured":"Lal George. MLRISC: Customizable and reusable code generators. Technical report, Bell Laboratories, May 1997."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/645683.664592"},{"key":"e_1_3_2_1_13_1","unstructured":"Allen Leung and Lal George. MLRISC Annotations."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/648236.761384"},{"key":"e_1_3_2_1_15_1","first-page":"25","volume-title":"Second ACM SIGPLAN Workshop on Compiler Support for System Software","author":"Morrisett Greg","year":"1999","unstructured":"Greg Morrisett, Karl Crary, Neal Glew, Dan Grossman, Richard Samuels, Frederick Smith, David Walker, Stephanie Weirich, and Steve Zdancewic. TALx86: A realistic typed assembly language. In Second ACM SIGPLAN Workshop on Compiler Support for System Software, pages 25--35, Atlanta, GA, 1999. INRIA Technical Report 0288, March 1999."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796801004178"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/319301.319345"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"volume-title":"Proc. 1997 ACM SIGPLAN Workshop on Types in Compilation","year":"1997","author":"Shao Zhong","key":"e_1_3_2_1_19_1","unstructured":"Zhong Shao. An overview of the FLINT\/ML compiler. In Proc. 1997 ACM SIGPLAN Workshop on Types in Compilation, June 1997."},{"volume-title":"July","year":"2001","author":"Swadi N.","key":"e_1_3_2_1_20_1","unstructured":"Kedar~N. Swadi and Andrew~W. Appel. Typed machine language and its semantics. www.cs.princeton.edu\/~appel\/papers, July 2001."},{"volume-title":"Construction of a semantic model for a typed assembly language","year":"2003","author":"Tan Gang","key":"e_1_3_2_1_21_1","unstructured":"Gang Tan, Kedar Swadi, Dinghao Wu, and Andrew~W. Appel. Construction of a semantic model for a typed assembly language. January 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/888251.888276"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/507635.507657"}],"event":{"name":"PLDI03: ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"],"location":"San Diego California USA","acronym":"PLDI03"},"container-title":["Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/781131.781155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T04:06:51Z","timestamp":1713758811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/781131.781155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5,9]]},"references-count":21,"alternative-id":["10.1145\/781131.781155","10.1145\/781131"],"URL":"https:\/\/doi.org\/10.1145\/781131.781155","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/780822.781155","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2003,5,9]]},"assertion":[{"value":"2003-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}