{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:49:47Z","timestamp":1777099787438,"version":"3.51.4"},"reference-count":48,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5753,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw. Test. Verif. Reliab."],"published-print":{"date-parts":[[1999,12]]},"DOI":"10.1002\/(sici)1099-1689(199912)9:4<233::aid-stvr191>3.0.co;2-3","type":"journal-article","created":{"date-parts":[[2005,12,3]],"date-time":"2005-12-03T04:47:19Z","timestamp":1133585239000},"page":"233-262","source":"Crossref","is-referenced-by-count":125,"title":["Using program slicing to assist in the detection of equivalent mutants"],"prefix":"10.1002","volume":"9","author":[{"given":"Rob","family":"Hierons","sequence":"first","affiliation":[]},{"given":"Mark","family":"Harman","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Danicic","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB1","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1145\/773473.178456","volume":"29","author":"Agrawal","year":"1994","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB2","author":"Agrawal","year":"1991","unstructured":"and (1991) \u2018Dynamic slicing in the presence of unconstrained pointers\u2019, Proceedings of the ACM Symposium on Software Testing, Analysis and Verification (TAV4), Victoria, British Columbia, Canada, October 1991, ACM Press, New York, U.S.A., pp. 60-73. Appears as Purdue University Technical Report SERC-TR-93-P."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB3","volume-title":"Compilers: Principles, Techniques and Tools","author":"Aho","year":"1986","unstructured":"and (1986) Compilers: Principles, Techniques and Tools, Addison Wesley, Reading, Massachusetts, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB4","author":"Baldwin","year":"1979","unstructured":"and (1979) \u2018Heuristics for determining equivalence of program mutations\u2019, Research Report 276, Department of Computer Science, Yale University, New Haven, Connecticut, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB5","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/BFb0019410","volume-title":"Proceedings of the 1st Workshop on Automated and Algorithmic Debugging (AADEBUG \u201893)","volume":"749","author":"Ball","year":"1993","unstructured":"and (1993) \u2018Slicing programs with arbitrary control-flow\u2019, In (Ed.), Proceedings of the 1st Workshop on Automated and Algorithmic Debugging (AADEBUG \u201893), Link\u00f6ping, Sweden, Lecture Notes in Computer Science, Springer, Berlin, Germany, Vol. 749, pp. 206-222. Also available as University of Wisconsin-Madison, Technical Report (in extended form) TR-1128, December 1992."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB6","first-page":"519","volume-title":"Proceedings of the ACM Symposium on Applied Computing","author":"Binkley","year":"1999","unstructured":"(1999) \u2018Computing amorphous program slices using dependence graphs and a data-flow model\u2019, Proceedings of the ACM Symposium on Applied Computing, San Antonio, Texas, U.S.A., ACM Press, New York, U.S.A., pp. 519-525."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB7","first-page":"1","volume-title":"Advances in Computers","volume":"43","author":"Binkley","year":"1996","unstructured":"and (1996) \u2018Program slicing\u2019, In (Ed.), Advances in Computers, Volume 43, Academic Press, San Diego, pp. 1-50."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB8","author":"Budd","year":"1981","unstructured":"(1981) \u2018Mutation analysis: ideas, examples, problems and prospects\u2019, Proceedings of the Summer School on Computer Program Testing, Sogesta, Urbino, Italy, June 1981, North-Holland, pp. 129-148."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB9","first-page":"595","volume-title":"Information and Software Technology","author":"Canfora","year":"1998","unstructured":"and . (1998) \u2018Conditioned program slicing\u2019, and (Eds), Information and Software Technology, Special Issue on Program Slicing, 40(11-12), 595-607."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB10","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/BFb0019411","volume-title":"Proceedings of the 1st Workshop on Automated and Algorithmic Debugging (AADEBUG \u201893), Lecture Notes in Computer Science","volume":"749","author":"Cheng","year":"1993","unstructured":"(1993) \u2018Slicing concurrent programs_a graph-theoretical approach\u2019, In (Ed.), Proceedings of the 1st Workshop on Automated and Algorithmic Debugging (AADEBUG \u201893), Lecture Notes in Computer Science, Springer, Berlin, Germany, Vol. 749, pp. 223-240."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB11","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1145\/183432.183438","volume":"16","author":"Choi","year":"1994","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB12","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/0020-0190(95)00170-0","volume":"56","author":"Danicic","year":"1995","journal-title":"Information Processing Letters"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB13","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"Demillo","year":"1978","journal-title":"IEEE Computer"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB14","author":"Ernst","year":"1994","unstructured":"(1994) \u2018Practical fine-grained static slicing of optimised code\u2019, Technical Report MSR-TR-94-14, Microsoft Research, Redmond, Washington, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB15","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/S0164-1212(96)00154-9","volume":"38","author":"Frankl","year":"1997","journal-title":"Journal of Systems and Software"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB16","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","volume":"3","author":"Hamlet","year":"1977","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB17","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1002\/stvr.4370050303","volume":"5","author":"Harman","year":"1995","journal-title":"Software Testing, Verification and Reliability"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB18","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/WPC.1997.601266","volume-title":"Proceedings of the 5th IEEE International Workshop on Program Comprehension (IWPC \u201897)","author":"Harman","year":"1997","unstructured":"and (1997) \u2018Amorphous program slicing\u2019, Proceedings of the 5th IEEE International Workshop on Program Comprehension (IWPC \u201897), Dearborn, Michigan, U.S.A., IEEE Computer Society Press, Los Alamitos, California, U.S.A., pp. 70-79."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB19","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1002\/(SICI)1096-908X(199811\/12)10:6<415::AID-SMR180>3.0.CO;2-Z","volume":"10","author":"Harman","year":"1998","journal-title":"Journal of Software Maintenance"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB20","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/WPC.1999.777760","volume-title":"Proceedings of the 7th IEEE International Workshop on Program Comprehension (IWPC \u201899)","author":"Harman","year":"1999","unstructured":", , and (1999) \u2018Program simplification as a means of approximating undecidable propositions\u2019, Proceedings of the 7th IEEE International Workshop on Program Comprehension (IWPC \u201899), Pittsburgh, Pennsylvania, U.S.A., IEEE Computer Society Press, Los Alamitos, California, U.S.A., pp. 208-217."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB21","first-page":"336","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance (ICSM \u201898)","author":"Harman","year":"1998","unstructured":"and (1998) \u2018Analysis of dynamic memory access using amorphous slicing\u2019, Proceedings of the IEEE International Conference on Software Maintenance (ICSM \u201898), Bethesda, Maryland, U.S.A., IEEE Computer Society Press, Los Alamitos, California, U.S.A., pp. 336-345."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB22","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/77606.77608","volume":"12","author":"Horwitz","year":"1990","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB23","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.1982.235571","volume":"8","author":"Howden","year":"1982","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB24","volume-title":"The C Programming Language","author":"Kernighan","year":"1988","unstructured":"and (1988) The C Programming Language, 2nd Edn, (ANSI C), Prentice Hall, Englewood Cliffs, New Jersey, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB25","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1002\/spe.4380210704","volume":"21","author":"King","year":"1991","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB26","first-page":"71","volume-title":"Proceedings of the 2nd International Workshop on Automated and Algorithmic Debugging (AADEBUG \u201895), Saint Malo, France","author":"Korel","year":"1995","unstructured":"(1995) \u2018Computation of dynamic slices for programs with arbitrary control flow\u2019, In (Ed.), Proceedings of the 2nd International Workshop on Automated and Algorithmic Debugging (AADEBUG \u201895), Saint Malo, France, pp. 71-86."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB27","first-page":"647","volume-title":"Information and Software Technology","author":"Korel","year":"1998","unstructured":"and (1998) \u2018Dynamic program slicing methods\u2019, In and (Eds), Information and Software Technology, Special Issue on Program Slicing, 40(11-12), 647-659."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB28","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/277633.277638","volume":"33","author":"Krinke","year":"1998","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB29","first-page":"661","volume-title":"Information and Software Technology","author":"Krinke","year":"1998","unstructured":"and (1998) \u2018Validation of measurement software as an application of slicing and constraint solving\u2019, In and (Eds), Information and Software Technology, Special Issue on Program Slicing, 40(11-12), 661-675."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB30","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/ICSE.1996.493444","volume-title":"Proceedings of the 18th International Conference on Software Engineering","author":"Larsen","year":"1996","unstructured":"and (1996) \u2018Slicing object-oriented software\u2019, Proceedings of the 18th International Conference on Software Engineering, Berlin, Germany, IEEE Computer Society Press, Los Alamitos, California, U.S.A., pp. 495-505."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB31","author":"Livadas","year":"1994","unstructured":"and (1994) \u2018Slicing in the presence of pointer variables\u2019, Technical Report SERC-TR-74-F, Computer Science and Information Services Department, University of Florida, Gainesville, Florida, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB32","author":"Lyle","year":"1993","unstructured":"and (1993) \u2018Program slicing in the presence of pointers\u2019, Proceedings of the Conference on Foundations of Software Engineering, Orlando, Florida, U.S.A., pp. 255-260."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB33","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/125489.125473","volume":"1","author":"Offutt","year":"1992","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB34","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1002\/stvr.4370040303","volume":"4","author":"Offutt","year":"1994","journal-title":"Software Testing, Verification and Reliability"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB35","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/(SICI)1097-024X(199902)29:2<167::AID-SPE225>3.0.CO;2-V","volume":"29","author":"Offutt","year":"1999","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB36","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/227607.227610","volume":"5","author":"Offutt","year":"1996","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB37","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/CMPASS.1996.507890","volume-title":"Proceedings of the Annual Conference on Computer Assurance (COMPASS 96)","author":"Offutt","year":"1996","unstructured":"and (1996) \u2018Detecting equivalent mutants and the feasible path problem\u2019, Proceedings of the Annual Conference on Computer Assurance (COMPASS 96), Gaithersburg, Maryland, U.S.A., IEEE Computer Society Press, Los Alamitos, California, U.S.A., pp. 224-236."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB38","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U","volume":"7","author":"Offutt","year":"1997","journal-title":"Software Testing, Verification and Reliability"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB39","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1002\/(SICI)1097-024X(199602)26:2<165::AID-SPE5>3.0.CO;2-K","volume":"26","author":"Offutt","year":"1996","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB40","author":"Pan","year":"1994","unstructured":"(1994) \u2018Using constraints to detect equivalent mutants\u2019, Master\u2019s thesis, George Mason University, Fairfax, Virginia, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB41","first-page":"121","volume":"3","author":"Tip","year":"1995","journal-title":"Journal of Programming Languages"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB42","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/236338.236355","volume":"31","author":"Tip","year":"1996","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB43","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/113446.113455","volume":"26","author":"Venkatesh","year":"1991","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB44","volume-title":"Software Fault Injection","author":"Voas","year":"1998","unstructured":"and (1998) Software Fault Injection, Wiley, New York, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB45","author":"Weiser","year":"1979","unstructured":"(1979) \u2018Program slices: Formal, psychological, and practical investigations of an automatic program abstraction method\u2019, PhD thesis, University of Michigan, Ann Arbor, Michigan, U.S.A."},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB46","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"Weiser","year":"1984","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB47","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/0950-5849(93)90053-6","volume":"35","author":"Woodward","year":"1993","journal-title":"Information and Software Technology"},{"key":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3-BIB48","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/WST.1988.5370","volume-title":"Proceedings of the Second Workshop on Software Testing, Verification, and Analysis","author":"Woodward","year":"1988","unstructured":"and (1988) \u2018From weak to strong, dead or alive? An analysis of some mutation testing issues\u2019, Proceedings of the Second Workshop on Software Testing, Verification, and Analysis, Banff, Canada, July 1988, IEEE Computer Society Press, Los Alamitos, California, U.S.A., pp. 152-158."}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1099-1689(199912)9:4%3C233::AID-STVR191%3E3.0.CO;2-3","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1099-1689(199912)9:4%3C233::AID-STVR191%3E3.0.CO;2-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T06:54:12Z","timestamp":1625122452000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1999,12]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1099-1689(199912)9:4<233::aid-stvr191>3.0.co;2-3","relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"value":"0960-0833","type":"print"},{"value":"1099-1689","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,12]]}}}