{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:34:07Z","timestamp":1729643647755,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.9","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T12:50:08Z","timestamp":1209387008000},"page":"17-26","source":"Crossref","is-referenced-by-count":14,"title":["An Evaluation of Slicing Algorithms for Concurrent Programs"],"prefix":"10.1109","author":[{"given":"Dennis","family":"Giffhorn","sequence":"first","affiliation":[]},{"given":"Christian","family":"Hammer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0024176"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/277631.277638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167744"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/940071.940096","article-title":"Context-sensitive slicing of concurrent programs","author":"krinke","year":"2003","journal-title":"Proc of ESEC'03"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380864"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1186632.1186636"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/347324.349121"},{"key":"ref18","first-page":"338","article-title":"An efficient algorithm for computing MHP information for concurrent java programs","author":"naumovich","year":"1999","journal-title":"Proc ESECIFSE '99"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/390010.808263"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0019411"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/375431.375420"},{"journal-title":"The Java Language Specification","year":"2005","author":"gosling","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1109\/APDC.1997.574057","article-title":"Dependence analysis of parallel and distributed programs and its applications","author":"cheng","year":"1997","journal-title":"International Conference on Advances in Parallel and Distributed Computing"},{"journal-title":"Proc IEEE Int'l Symp Secure Software Eng","year":"2006","author":"hammer","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/996821.996830"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/158511.158694"},{"key":"ref9","first-page":"1","article-title":"A formal study of slicing for multi-threaded programs with jvm primitives","author":"hatcliff","year":"1999","journal-title":"Static Analysis Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380230603"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/349214.349241"},{"key":"ref22","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"J Program Lang"},{"key":"ref21","article-title":"Two approaches to interprocedural data flow analysis","author":"sharir","year":"1981","journal-title":"Program Flow Analysis Theory and Applications"},{"key":"ref24","first-page":"312","article-title":"Static slicing of concurrent object-oriented programs","author":"zhao","year":"1996","journal-title":"Proceedings of the 20th IEEE Annual Int Computer Software and Applications Conference"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1999.777751"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362894.pdf?arnumber=4362894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:30:00Z","timestamp":1497756600000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.9","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}