{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T00:40:06Z","timestamp":1736642406415,"version":"3.32.0"},"reference-count":13,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,10,31]],"date-time":"2006-10-31T00:00:00Z","timestamp":1162252800000},"content-version":"vor","delay-in-days":4686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Testing Verif &amp; Rel"],"published-print":{"date-parts":[[1994,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A combination of three approaches is proposed here to validate the functional equivalence of re\u2010engineered programs. These are: control path comparison; data result comparison; and data flow comparison. Two of the three approaches are based on the theory of program slicing. The third approach is based on the theory of data invariance, i.e. the same input must produce the same output. Together, these techniques can provide a cost effective regression test environment for large scale re\u2010engineering projects.<\/jats:p>","DOI":"10.1002\/stvr.4370040105","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T06:12:24Z","timestamp":1163830344000},"page":"33-44","source":"Crossref","is-referenced-by-count":7,"title":["Validating functional equivalence of re\u2010engineered programs via control path, result, and data flow comparison"],"prefix":"10.1002","volume":"4","author":[{"given":"Harry M.","family":"Sneed","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,31]]},"reference":[{"key":"e_1_2_1_2_1","first-page":"34","volume-title":"Software System Testing Techniques","author":"Beizer B.","year":"1983"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Benedusi P. Cimitile A.andDe Carlini U.(1988) \u2018Post maintenance testing based on path change analysis\u2019 Proceedings of the Conference on Software Maintenance Phoenix Arizona U.S.A. IEEE Computer Society Press pp.352\u2013361.","DOI":"10.1109\/ICSM.1988.10187"},{"key":"e_1_2_1_4_1","first-page":"34","volume-title":"Proceedings of the 3rd Annual Systems Reengineering Technology Workshop","author":"Blum B.","year":"1992"},{"key":"e_1_2_1_5_1","unstructured":"DOCKET(1992) DOCKET Final Report ESPRIT Project 5111 Consorzio Campano di Ricerca per l'Informatica e l'Automazione Industriale 80055 Portici Italy December 1992."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.43047"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"key":"e_1_2_1_8_1","first-page":"34","volume-title":"Proceedings of the Workshop on Software Testing","author":"Sneed H.","year":"1986"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360030304"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Sneed H. (1991b ) \u2018Bank application reengineering and conversion at the Union Bank of Switzerland\u2019 Proceedings of the Conference on Software Maintenance Sorrento Italy October 1991 IEEE Computer Society Press pp.60\u201372.","DOI":"10.1109\/ICSM.1991.160308"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.230356"},{"key":"e_1_2_1_13_1","first-page":"19","volume-title":"DOD Reengineering Economics Handbook","author":"Wood M.","year":"1992"},{"key":"e_1_2_1_14_1","first-page":"272","volume-title":"Proceedings of COMPSAC 87","author":"Yau S. S.","year":"1987"}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fstvr.4370040105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.4370040105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T00:05:55Z","timestamp":1736640355000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/stvr.4370040105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1994,1]]}},"alternative-id":["10.1002\/stvr.4370040105"],"URL":"https:\/\/doi.org\/10.1002\/stvr.4370040105","archive":["Portico"],"relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"type":"print","value":"0960-0833"},{"type":"electronic","value":"1099-1689"}],"subject":[],"published":{"date-parts":[[1994,1]]}}}