{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:25:19Z","timestamp":1769757919133,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319668444","type":"print"},{"value":"9783319668451","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66845-1_20","type":"book-chapter","created":{"date-parts":[[2017,8,26]],"date-time":"2017-08-26T11:37:20Z","timestamp":1503747440000},"page":"312-319","source":"Crossref","is-referenced-by-count":4,"title":["SemSlice: Exploiting Relational Verification for Automatic Program Slicing"],"prefix":"10.1007","author":[{"given":"Bernhard","family":"Beckert","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Bormer","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Gocht","sequence":"additional","affiliation":[]},{"given":"Mihai","family":"Herda","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Lentzsch","sequence":"additional","affiliation":[]},{"given":"Mattias","family":"Ulbrich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,27]]},"reference":[{"issue":"2","key":"20_CR1","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s00165-011-0196-1","volume":"24","author":"JB Barros","year":"2012","unstructured":"Barros, J.B., Da Cruz, D., Henriques, P.R., Pinto, J.S.: Assertion-based slicing and slice graphs. Formal Aspects Comput. 24(2), 217\u2013248 (2012)","journal-title":"Formal Aspects Comput."},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-21437-0_17","volume-title":"FM 2011: Formal Methods","author":"G Barthe","year":"2011","unstructured":"Barthe, G., Crespo, J.M., Kunz, C.: Relational verification using product programs. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 200\u2013214. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-21437-0_17"},{"key":"20_CR3","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/S0065-2458(03)62003-6","volume":"62","author":"D Binkley","year":"2004","unstructured":"Binkley, D., Harman, M.: A survey of empirical results on program slicing. Adv. Comput. 62, 105\u2013178 (2004)","journal-title":"Adv. Comput."},{"issue":"11","key":"20_CR4","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S0950-5849(98)00086-X","volume":"40","author":"G Canfora","year":"1998","unstructured":"Canfora, G., Cimitile, A., De Lucia, A.: Conditioned program slicing. Inf. Softw. Technol. 40(11), 595\u2013607 (1998)","journal-title":"Inf. Softw. Technol."},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"da Cruz, D., Henriques, P.R., Pinto, J.S.: Gamaslicer: an online laboratory for program verification and analysis. In: Proceedings of the Tenth Workshop on Language Descriptions, Tools and Applications. p. 3. ACM (2010)","DOI":"10.1145\/1868281.1868284"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Eranki, K.L., Moudgalya, K.M.: Program slicing technique: a novel approach to improve programming skills in novice learners. In: Proceedings of the Conference on Information Technology Education. pp. 160\u2013165. ACM (2016)","DOI":"10.1145\/2978192.2978215"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Felsing, D., Grebing, S., Klebanov, V., R\u00fcmmer, P., Ulbrich, M.: Automating regression verification. In: Proceedings of the International Conference on Automated Software Engineering, ASE 2014, pp. 349\u2013360. ACM (2014)","DOI":"10.1145\/2642937.2642987"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Field, J., Ramalingam, G., Tip, F.: Parametric program slicing. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 379\u2013392. ACM (1995)","DOI":"10.1145\/199448.199534"},{"issue":"9","key":"20_CR9","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.scico.2012.05.007","volume":"78","author":"R Halder","year":"2013","unstructured":"Halder, R., Cortesi, A.: Abstract program slicing on dependence condition graphs. Sci. Comput. Program. 78(9), 1240\u20131263 (2013)","journal-title":"Sci. Comput. Program."},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-642-32759-9_21","volume-title":"FM 2012: Formal Methods","author":"H Hojjat","year":"2012","unstructured":"Hojjat, H., Kone\u010dn\u00fd, F., Garnier, F., Iosif, R., Kuncak, V., R\u00fcmmer, P.: A verification toolkit for numerical transition systems. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 247\u2013251. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-32759-9_21"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-33125-1_17","volume-title":"Static Analysis","author":"J Jaffar","year":"2012","unstructured":"Jaffar, J., Murali, V., Navas, J.A., Santosa, A.E.: Path-sensitive backward slicing. In: Min\u00e9, A., Schmidt, D. (eds.) SAS 2012. LNCS, vol. 7460, pp. 231\u2013247. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-33125-1_17"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-319-48869-1_12","volume-title":"Verified Software. Theories, Tools, and Experiments","author":"M Kiefer","year":"2016","unstructured":"Kiefer, M., Klebanov, V., Ulbrich, M.: Relational program reasoning using compiler IR. In: Blazy, S., Chechik, M. (eds.) VSTTE 2016. LNCS, vol. 9971, pp. 149\u2013165. Springer, Cham (2016). doi:\n10.1007\/978-3-319-48869-1_12"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-642-38856-9_15","volume-title":"Static Analysis","author":"R Komondoor","year":"2013","unstructured":"Komondoor, R.: Precise slicing in imperative programs via term-rewriting and abstract interpretation. In: Logozzo, F., F\u00e4hndrich, M. (eds.) SAS 2013. LNCS, vol. 7935, pp. 259\u2013282. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-38856-9_15"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.: Llvm: A compilation framework for lifelong program analysis and transformation. In: International Symposium on Code Generation and Optimization, CGO 2004, pp. 75\u201386. IEEE (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"key":"20_CR15","volume-title":"Clean Code: A Handbook of Agile Software Craftsmanship","author":"RC Martin","year":"2008","unstructured":"Martin, R.C.: Clean Code: A Handbook of Agile Software Craftsmanship, 1st edn. Prentice Hall PTR, Upper Saddle River, NJ (2008)","edition":"1"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-642-16901-4_30","volume-title":"Formal Methods and Software Engineering","author":"I Mastroeni","year":"2010","unstructured":"Mastroeni, I., Nikoli\u0107, \u0110.: Abstract program slicing: from theory towards an implementation. In: Dong, J.S., Zhu, H. (eds.) ICFEM 2010. LNCS, vol. 6447, pp. 452\u2013467. Springer, Heidelberg (2010). doi:\n10.1007\/978-3-642-16901-4_30"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Ward, M.: Properties of slicing definitions. In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, pp. 23\u201332. IEEE (2009)","DOI":"10.1109\/SCAM.2009.12"},{"key":"20_CR18","unstructured":"Weiser, M.: Program slicing. In: Proceedings of the 5th International Conference on Software Engineering. pp. 439\u2013449. IEEE Press (1981)"}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66845-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,26]],"date-time":"2017-08-26T11:43:34Z","timestamp":1503747814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66845-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319668444","9783319668451"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66845-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}