{"id":"https://openalex.org/W2886799409","doi":"https://doi.org/10.1145/3238147.3238174","title":"Safe stream-based programming with refinement types","display_name":"Safe stream-based programming with refinement types","publication_year":2018,"publication_date":"2018-08-20","ids":{"openalex":"https://openalex.org/W2886799409","doi":"https://doi.org/10.1145/3238147.3238174","mag":"2886799409"},"language":"en","primary_location":{"id":"doi:10.1145/3238147.3238174","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3238147.3238174","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3238147.3238174","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3238147.3238174","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Benno Stein","orcid":null},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Benno Stein","raw_affiliation_strings":["University of Colorado Boulder, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Boulder, USA","institution_ids":["https://openalex.org/I188538660"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lazaro Clapp","orcid":null},"institutions":[{"id":"https://openalex.org/I2946016260","display_name":"Uber AI (United States)","ror":"https://ror.org/05vm0ed18","country_code":"US","type":"company","lineage":["https://openalex.org/I2946016260"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lazaro Clapp","raw_affiliation_strings":["Uber Technologies, USA"],"affiliations":[{"raw_affiliation_string":"Uber Technologies, USA","institution_ids":["https://openalex.org/I2946016260"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Manu Sridharan","orcid":null},"institutions":[{"id":"https://openalex.org/I2946016260","display_name":"Uber AI (United States)","ror":"https://ror.org/05vm0ed18","country_code":"US","type":"company","lineage":["https://openalex.org/I2946016260"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Manu Sridharan","raw_affiliation_strings":["Uber Technologies, USA"],"affiliations":[{"raw_affiliation_string":"Uber Technologies, USA","institution_ids":["https://openalex.org/I2946016260"]}]},{"author_position":"last","author":{"id":null,"display_name":"Bor-Yuh Evan Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bor-Yuh Evan Chang","raw_affiliation_strings":["University of Colorado Boulder, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Boulder, USA","institution_ids":["https://openalex.org/I188538660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I188538660"],"apc_list":null,"apc_paid":null,"fwci":0.9182,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77851273,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"565","last_page":"576"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/callback","display_name":"Callback","score":0.9323999881744385},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.6873999834060669},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4684000015258789},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4478999972343445},{"id":"https://openalex.org/keywords/data-type","display_name":"Data type","score":0.35010001063346863},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.3357999920845032},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.328000009059906},{"id":"https://openalex.org/keywords/undo","display_name":"Undo","score":0.31790000200271606}],"concepts":[{"id":"https://openalex.org/C204495577","wikidata":"https://www.wikidata.org/wiki/Q1205349","display_name":"Callback","level":2,"score":0.9323999881744385},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8439000248908997},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.7408000230789185},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.6873999834060669},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4684000015258789},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4478999972343445},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.35120001435279846},{"id":"https://openalex.org/C138958017","wikidata":"https://www.wikidata.org/wiki/Q190087","display_name":"Data type","level":2,"score":0.35010001063346863},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.328000009059906},{"id":"https://openalex.org/C2780154230","wikidata":"https://www.wikidata.org/wiki/Q513420","display_name":"Undo","level":2,"score":0.31790000200271606},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31349998712539673},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29440000653266907},{"id":"https://openalex.org/C150762246","wikidata":"https://www.wikidata.org/wiki/Q4354073","display_name":"Reactive programming","level":4,"score":0.28949999809265137},{"id":"https://openalex.org/C2779038628","wikidata":"https://www.wikidata.org/wiki/Q7248497","display_name":"Programming by demonstration","level":3,"score":0.27810001373291016},{"id":"https://openalex.org/C107027933","wikidata":"https://www.wikidata.org/wiki/Q2006448","display_name":"Stream processing","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C175971053","wikidata":"https://www.wikidata.org/wiki/Q827335","display_name":"Abstract data type","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.25850000977516174},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.2522999942302704},{"id":"https://openalex.org/C2983685735","wikidata":"https://www.wikidata.org/wiki/Q5227355","display_name":"Data source","level":2,"score":0.25130000710487366},{"id":"https://openalex.org/C44779574","wikidata":"https://www.wikidata.org/wiki/Q736866","display_name":"Type safety","level":2,"score":0.25110000371932983}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3238147.3238174","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3238147.3238174","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3238147.3238174","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1808.02998","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.02998","pdf_url":"https://arxiv.org/pdf/1808.02998","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3238147.3238174","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3238147.3238174","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3238147.3238174","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2717160041","display_name":null,"funder_award_id":"CCF-1055066","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4713059963","display_name":null,"funder_award_id":"FA8750","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5921281487","display_name":null,"funder_award_id":"number","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6384370850","display_name":"CAREER:  Cooperative Program Analysis:  Bridging the Gap Between User and Tool Reasoning","funder_award_id":"1055066","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2886799409.pdf","grobid_xml":"https://content.openalex.org/works/W2886799409.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W176206521","https://openalex.org/W1669449081","https://openalex.org/W1793982226","https://openalex.org/W1812630525","https://openalex.org/W1988737164","https://openalex.org/W1994931937","https://openalex.org/W1995362840","https://openalex.org/W2013856010","https://openalex.org/W2016323637","https://openalex.org/W2055703785","https://openalex.org/W2075623758","https://openalex.org/W2088139180","https://openalex.org/W2088749975","https://openalex.org/W2091932246","https://openalex.org/W2101085206","https://openalex.org/W2101800210","https://openalex.org/W2106355420","https://openalex.org/W2125995229","https://openalex.org/W2148397566","https://openalex.org/W2161963160","https://openalex.org/W2162635569","https://openalex.org/W2164170598","https://openalex.org/W2164539435","https://openalex.org/W2167744164","https://openalex.org/W2227887088","https://openalex.org/W2356780433","https://openalex.org/W2389540670","https://openalex.org/W2463553622","https://openalex.org/W2513201734","https://openalex.org/W2548210355","https://openalex.org/W4229717394","https://openalex.org/W4300810260"],"related_works":[],"abstract_inverted_index":{"In":[0],"stream-based":[1,68],"programming,":[2],"data":[3,36],"sources":[4,37],"are":[5],"abstracted":[6],"as":[7,25,75],"a":[8,28,83],"stream":[9,43],"of":[10,90],"values":[11],"that":[12,78],"can":[13,45],"be":[14],"manipulated":[15],"via":[16],"callback":[17],"functions.":[18],"Stream-based":[19],"programming":[20],"is":[21,63,93],"exploding":[22],"in":[23,38,59],"popularity,":[24],"it":[26,48],"provides":[27],"powerful":[29],"and":[30,56,96],"expressive":[31],"paradigm":[32],"for":[33,50],"handling":[34],"asynchronous":[35,67],"interactive":[39],"software.":[40],"However,":[41],"high-level":[42],"abstractions":[44],"also":[46],"make":[47],"difficult":[49],"developers":[51],"to":[52,82],"reason":[53],"about":[54],"control-":[55],"data-flow":[57],"relationships":[58],"their":[60],"programs.":[61],"This":[62],"particularly":[64],"impactful":[65],"when":[66],"code":[69],"interacts":[70],"with":[71],"thread-limited":[72],"features":[73],"such":[74],"UI":[76,80],"frameworks":[77],"restrict":[79],"access":[81],"single":[84],"thread,":[85],"since":[86],"the":[87],"threading":[88],"behavior":[89],"streaming":[91],"constructs":[92],"often":[94],"non-intuitive":[95],"insufficiently":[97],"documented.":[98]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2018-08-22T00:00:00"}
