callback( { "result":{ "query":":facetid:toc:\"db/conf/agere/agere2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"67.65" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"17", "@dc":"17", "@oc":"17", "@id":"43365316", "text":":facetid:toc:db/conf/agere/agere2012.bht" } }, "hits":{ "@total":"17", "@computed":"17", "@sent":"17", "@first":"0", "hit":[{ "@score":"1", "@id":"4371154", "info":{"authors":{"author":[{"@pid":"117/8434","text":"Ahmad Ahmad-Kassem"},{"@pid":"g/SGrumbach","text":"Stéphane Grumbach"},{"@pid":"46/3154","text":"Stéphane Ubéda"}]},"title":"Messages with implicit destinations as mobile agents.","venue":"AGERE@SPLASH","pages":"107-118","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/Ahmad-KassemGU12","doi":"10.1145/2414639.2414652","ee":"https://doi.org/10.1145/2414639.2414652","url":"https://dblp.org/rec/conf/agere/Ahmad-KassemGU12"}, "url":"URL#4371154" }, { "@score":"1", "@id":"4371155", "info":{"authors":{"author":[{"@pid":"01/5624","text":"Saddek Bensalem"},{"@pid":"05/178","text":"Marius Bozga"},{"@pid":"34/8929","text":"Jean Quilbeuf"},{"@pid":"s/JosephSifakis","text":"Joseph Sifakis"}]},"title":"Optimized distributed implementation of multiparty interactions with observation.","venue":"AGERE@SPLASH","pages":"71-82","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/BensalemBQS12","doi":"10.1145/2414639.2414649","ee":"https://doi.org/10.1145/2414639.2414649","url":"https://dblp.org/rec/conf/agere/BensalemBQS12"}, "url":"URL#4371155" }, { "@score":"1", "@id":"4371156", "info":{"authors":{"author":[{"@pid":"64/3701","text":"Chih-Hong Cheng"},{"@pid":"67/5345","text":"Rongjie Yan"},{"@pid":"28/800","text":"Harald Ruess"},{"@pid":"01/5624","text":"Saddek Bensalem"}]},"title":"Distributed priority synthesis using knowledge.","venue":"AGERE@SPLASH","pages":"129-132","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/ChengYRB12","doi":"10.1145/2414639.2414656","ee":"https://doi.org/10.1145/2414639.2414656","url":"https://dblp.org/rec/conf/agere/ChengYRB12"}, "url":"URL#4371156" }, { "@score":"1", "@id":"4371157", "info":{"authors":{"author":[{"@pid":"127/6548","text":"Emanuele D'Osualdo"},{"@pid":"59/9638","text":"Jonathan Kochems"},{"@pid":"o/CHLukeOng","text":"Luke Ong"}]},"title":"Soter: an automatic safety verifier for erlang.","venue":"AGERE@SPLASH","pages":"137-140","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/DOsualdoKO12","doi":"10.1145/2414639.2414658","ee":"https://doi.org/10.1145/2414639.2414658","url":"https://dblp.org/rec/conf/agere/DOsualdoKO12"}, "url":"URL#4371157" }, { "@score":"1", "@id":"4371158", "info":{"authors":{"author":[{"@pid":"12/10872","text":"Álvaro Fernández Díaz"},{"@pid":"48/1649","text":"Clara Benac Earle"},{"@pid":"f/LarsAkeFredlund","text":"Lars-Åke Fredlund"}]},"title":"Adding distribution and fault tolerance to jason.","venue":"AGERE@SPLASH","pages":"95-106","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/DiazEF12","doi":"10.1145/2414639.2414651","ee":"https://doi.org/10.1145/2414639.2414651","url":"https://dblp.org/rec/conf/agere/DiazEF12"}, "url":"URL#4371158" }, { "@score":"1", "@id":"4371159", "info":{"authors":{"author":{"@pid":"94/5786","text":"Philipp Haller"}},"title":"On the integration of the actor model in mainstream technologies: the scala perspective.","venue":"AGERE@SPLASH","pages":"1-6","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/Haller12","doi":"10.1145/2414639.2414641","ee":"https://doi.org/10.1145/2414639.2414641","url":"https://dblp.org/rec/conf/agere/Haller12"}, "url":"URL#4371159" }, { "@score":"1", "@id":"4371160", "info":{"authors":{"author":[{"@pid":"99/7840","text":"Ehsan Khamespanah"},{"@pid":"143/9979","text":"Zeynab Sabahi-Kaviani"},{"@pid":"93/1066","text":"Ramtin Khosravi"},{"@pid":"33/781","text":"Marjan Sirjani"},{"@pid":"144/4425","text":"Mohammad-Javad Izadi"}]},"title":"Timed-rebeca schedulability and deadlock-freedom analysis using floating-time transition system.","venue":"AGERE@SPLASH","pages":"23-34","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/KhamespanahSKSI12","doi":"10.1145/2414639.2414645","ee":"https://doi.org/10.1145/2414639.2414645","url":"https://dblp.org/rec/conf/agere/KhamespanahSKSI12"}, "url":"URL#4371160" }, { "@score":"1", "@id":"4371161", "info":{"authors":{"author":[{"@pid":"16/10956","text":"Joeri De Koster"},{"@pid":"20/6382","text":"Tom Van Cutsem"},{"@pid":"d/TheoDHondt","text":"Theo D'Hondt"}]},"title":"Domains: safe sharing among actors.","venue":"AGERE@SPLASH","pages":"11-22","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/KosterCD12","doi":"10.1145/2414639.2414644","ee":"https://doi.org/10.1145/2414639.2414644","url":"https://dblp.org/rec/conf/agere/KosterCD12"}, "url":"URL#4371161" }, { "@score":"1", "@id":"4371162", "info":{"authors":{"author":[{"@pid":"119/1559","text":"Ilham W. Kurnia"},{"@pid":"65/5923","text":"Arnd Poetzsch-Heffter"}]},"title":"A relational trace logic for simple hierarchical actor-based component systems.","venue":"AGERE@SPLASH","pages":"47-58","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/KurniaP12","doi":"10.1145/2414639.2414647","ee":"https://doi.org/10.1145/2414639.2414647","url":"https://dblp.org/rec/conf/agere/KurniaP12"}, "url":"URL#4371162" }, { "@score":"1", "@id":"4371163", "info":{"authors":{"author":[{"@pid":"98/5121","text":"Assaf Marron"},{"@pid":"52/1274","text":"Gera Weiss"},{"@pid":"46/8330","text":"Guy Wiener"}]},"title":"A decentralized approach for programming interactive applications with JavaScript and blockly.","venue":"AGERE@SPLASH","pages":"59-70","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/MarronWW12","doi":"10.1145/2414639.2414648","ee":"https://doi.org/10.1145/2414639.2414648","url":"https://dblp.org/rec/conf/agere/MarronWW12"}, "url":"URL#4371163" }, { "@score":"1", "@id":"4371164", "info":{"authors":{"author":[{"@pid":"119/9984","text":"Thierry Renaux"},{"@pid":"66/8164","text":"Lode Hoste"},{"@pid":"33/7864","text":"Stefan Marr"},{"@pid":"18/2971","text":"Wolfgang De Meuter"}]},"title":"Parallel gesture recognition with soft real-time guarantees.","venue":"AGERE@SPLASH","pages":"35-46","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/RenauxHMM12","doi":"10.1145/2414639.2414646","ee":"https://doi.org/10.1145/2414639.2414646","url":"https://dblp.org/rec/conf/agere/RenauxHMM12"}, "url":"URL#4371164" }, { "@score":"1", "@id":"4371165", "info":{"authors":{"author":[{"@pid":"26/6718","text":"Alessandro Ricci"},{"@pid":"63/7737","text":"Andrea Santi"}]},"title":"Programming abstractions for integrating autonomous and reactive behaviors: an agent-oriented approach.","venue":"AGERE@SPLASH","pages":"83-94","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/RicciS12","doi":"10.1145/2414639.2414650","ee":"https://doi.org/10.1145/2414639.2414650","url":"https://dblp.org/rec/conf/agere/RicciS12"}, "url":"URL#4371165" }, { "@score":"1", "@id":"4371166", "info":{"authors":{"author":{"@pid":"r/MBvRiemsdijk","text":"M. Birna van Riemsdijk"}},"title":"20 years of agent-oriented programming in distributed AI: history and outlook.","venue":"AGERE@SPLASH","pages":"7-10","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/Riemsdijk12","doi":"10.1145/2414639.2414642","ee":"https://doi.org/10.1145/2414639.2414642","url":"https://dblp.org/rec/conf/agere/Riemsdijk12"}, "url":"URL#4371166" }, { "@score":"1", "@id":"4371167", "info":{"authors":{"author":{"@pid":"r/MBvRiemsdijk","text":"M. Birna van Riemsdijk"}},"title":"Empirical software engineering for agent programming.","venue":"AGERE@SPLASH","pages":"119-122","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/Riemsdijk12a","doi":"10.1145/2414639.2414654","ee":"https://doi.org/10.1145/2414639.2414654","url":"https://dblp.org/rec/conf/agere/Riemsdijk12a"}, "url":"URL#4371167" }, { "@score":"1", "@id":"4371168", "info":{"authors":{"author":{"@pid":"69/5450","text":"Jeffery von Ronne"}},"title":"Leveraging actors for privacy compliance.","venue":"AGERE@SPLASH","pages":"133-136","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/Ronne12","doi":"10.1145/2414639.2414657","ee":"https://doi.org/10.1145/2414639.2414657","url":"https://dblp.org/rec/conf/agere/Ronne12"}, "url":"URL#4371168" }, { "@score":"1", "@id":"4371169", "info":{"authors":{"author":{"@pid":"144/4429","text":"Dale Schumacher"}},"title":"Actor idioms.","venue":"AGERE@SPLASH","pages":"123-128","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/agere/Schumacher12","doi":"10.1145/2414639.2414655","ee":"https://doi.org/10.1145/2414639.2414655","url":"https://dblp.org/rec/conf/agere/Schumacher12"}, "url":"URL#4371169" }, { "@score":"1", "@id":"4512943", "info":{"authors":{"author":[{"@pid":"a/GulAAgha","text":"Gul A. Agha"},{"@pid":"b/RafaelHBordini","text":"Rafael H. Bordini"},{"@pid":"98/5121","text":"Assaf Marron"},{"@pid":"26/6718","text":"Alessandro Ricci"}]},"title":"Proceedings of the 2nd edition on Programming systems, languages and applications based on actors, agents, and decentralized control abstractions, AGERE! 2012, October 21-22, 2012, Tucson, Arizona, USA","venue":"AGERE@SPLASH","publisher":"ACM","year":"2012","type":"Editorship","key":"conf/agere/2012","doi":"10.1145/2414639","ee":"https://doi.org/10.1145/2414639","url":"https://dblp.org/rec/conf/agere/2012"}, "url":"URL#4512943" } ] } } } )