{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:55:28Z","timestamp":1742799328161},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540756972"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75698-9_2","type":"book-chapter","created":{"date-parts":[[2007,10,4]],"date-time":"2007-10-04T02:26:03Z","timestamp":1191464763000},"page":"17-32","source":"Crossref","is-referenced-by-count":13,"title":["Slicing Abstractions"],"prefix":"10.1007","author":[{"given":"Ingo","family":"Br\u00fcckner","sequence":"first","affiliation":[]},{"given":"Klaus","family":"Dr\u00e4ger","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Finkbeiner","sequence":"additional","affiliation":[]},{"given":"Heike","family":"Wehrheim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/3-540-63166-6_10","volume-title":"Computer Aided Verification","author":"S. Graf","year":"1997","unstructured":"Graf, S., Saidi, H.: Construction of abstract state graphs with PVS. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol.\u00a01254, pp. 72\u201383. Springer, Heidelberg (1997)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/BFb0028753","volume-title":"Computer Aided Verification","author":"M.A. Col\u00f3n","year":"1998","unstructured":"Col\u00f3n, M.A., Uribe, T.E.: Generating finite-state abstractions of reactive systems using decision procedures. In: Vardi, M.Y. (ed.) CAV 1998. LNCS, vol.\u00a01427, pp. 293\u2013304. Springer, Heidelberg (1998)"},{"key":"2_CR3","first-page":"103","volume-title":"Proc. SPIN 2001","author":"T. Ball","year":"2001","unstructured":"Ball, T., Rajamani, S.K.: Automatically validating temporal safety properties of interfaces. In: Proc. SPIN 2001, pp. 103\u2013122. Springer, New York (2001)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 154\u2013169. Springer, Heidelberg (2000)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36385-8","volume-title":"Formal Methods in Computer-Aided Design","author":"S. Das","year":"2002","unstructured":"Das, S., Dill, D.L.: Counter-example based predicate discovery in predicate abstraction. In: Aagaard, M.D., O\u2019Leary, J.W. (eds.) FMCAD 2002. LNCS, vol.\u00a02517, Springer, Heidelberg (2002)"},{"key":"2_CR6","first-page":"58","volume-title":"Proc. POPL 2002","author":"T. Henzinger","year":"2002","unstructured":"Henzinger, T., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. In: Proc. POPL 2002, pp. 58\u201370. ACM Press, New York (2002)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/11817963_14","volume-title":"Computer Aided Verification","author":"K.L. McMillan","year":"2006","unstructured":"McMillan, K.L.: Lazy abstraction with interpolants. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol.\u00a04144, pp. 123\u2013136. Springer, Heidelberg (2006)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Sipma, H.B., Uribe, T.E., Manna, Z.: Deductive model checking. Formal Methods in System Design 15(1), 49\u201374 (1999) (Preliminary version appeared). In: Proc. 8th Intl. Conference on Computer Aided Verification. LNCS, vol. 1102, pp. 208\u2013219. Springer-Verlag, Heidelberg (1996)","DOI":"10.1007\/3-540-61474-5_70"},{"key":"2_CR9","first-page":"439","volume-title":"Proceedings of the 5th International Conference on Software Engineering","author":"M. Weiser","year":"1981","unstructured":"Weiser, M.: Program slicing. In: Proceedings of the 5th International Conference on Software Engineering, pp. 439\u2013449. IEEE Press, Los Alamitos (1981)"},{"key":"2_CR10","unstructured":"Ganesh, V., Saidi, N.S.H.: Slicing SAL. Technical report, SRI International (1999), http:\/\/theory.stanford.edu\/"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11691372_5","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M.B. Dwyer","year":"2006","unstructured":"Dwyer, M.B., Hatcliff, J., Hoosier, M., Ranganath, V., Robby, W.T.: Evaluating the effectiveness of slicing for model reduction of concurrent object-oriented programs. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006 and ETAPS 2006. LNCS, vol.\u00a03920, pp. 73\u201389. Springer, Heidelberg (2006)"},{"issue":"4","key":"2_CR12","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s100090050041","volume":"2","author":"L. Millett","year":"2000","unstructured":"Millett, L., Teitelbaum, T.: Issues in slicing PROMELA and its applications to model checking, protocol understanding, and simulation. Software Tools for Technology Transfer\u00a02(4), 343\u2013349 (2000)","journal-title":"Software Tools for Technology Transfer"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/3-540-48119-2_19","volume-title":"FM\u201999 - Formal Methods","author":"M. Bozga","year":"1999","unstructured":"Bozga, M., Fernandez, J.C., Ghirvu, L., Graf, S., Krimm, J.P., Mounier, L.: IF: An Intermediate Representation and Validation Environment for Timed Asynchronous Systems. In: Wing, J.M., Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 307\u2013327. Springer, Heidelberg (1999)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1065010.1065016","volume-title":"Proc. PLDI 2005","author":"R. Jhala","year":"2005","unstructured":"Jhala, R., Majumdar, R.: Path slicing. In: Proc. PLDI 2005, pp. 38\u201347. ACM Press, New York (2005)"},{"key":"2_CR15","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S0950-5849(98)00086-X","volume":"40","author":"G. Canfora","year":"1998","unstructured":"Canfora, G., Cimitile, A., Lucia, A.D.: Conditioned program slicing. Information and Software Technology Special Issue on Program Slicing\u00a040, 595\u2013607 (1998)","journal-title":"Information and Software Technology Special Issue on Program Slicing"},{"key":"2_CR16","first-page":"89","volume-title":"IWPC","author":"C. Fox","year":"2001","unstructured":"Fox, C., Danicic, S., Harman, M., Hierons, R.M.: Backward Conditioning: A New Program Specialisation Technique and Its Application to Program Comprehension. In: IWPC, pp. 89\u201397. IEEE Computer Society, Los Alamitos (2001)"},{"issue":"6","key":"2_CR17","first-page":"279","volume":"128","author":"S. Vasudevan","year":"2005","unstructured":"Vasudevan, S., Emerson, E.A., Abraham, J.A.: Efficient Model Checking of Hardware Using Conditioned Slicing. ENTCS\u00a0128(6), 279\u2013294 (2005)","journal-title":"ENTCS"},{"key":"2_CR18","first-page":"25","volume-title":"SCAM","author":"H. Hong","year":"2005","unstructured":"Hong, H., Lee, I., Sokolsky, O.: Abstract slicing: A new approach to program slicing based on abstract interpretation and model checking. In: SCAM, pp. 25\u201334. IEEE Computer Society, Los Alamitos (2005)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K.L. McMillan","year":"2005","unstructured":"McMillan, K.L.: Applications of Craig interpolants in model checking. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 1\u201312. Springer, Heidelberg (2005)"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1145\/964001.964021","volume-title":"Proc. POPL 2004","author":"T.A. Henzinger","year":"2004","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R., McMillan, K.L.: Abstractions from proofs. In: Proc. POPL 2004, pp. 232\u2013244. ACM Press, New York (2004)"},{"key":"2_CR21","unstructured":"Rybalchenko, A.: CLP-prover (2006), http:\/\/mtc.epfl.ch\/~rybalche\/clp-prover\/"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","volume-title":"Practical Aspects of Declarative Languages","author":"A. Podelski","year":"2006","unstructured":"Podelski, A., Rybalchenko, A.: ARMC: the logical choice for software model checking with abstraction refinement. In: Hanus, M. (ed.) PADL 2007. LNCS, vol.\u00a04354, Springer, Heidelberg (2006)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/3-540-44829-2_17","volume-title":"SPIN 2003","author":"T.A. Henzinger","year":"2003","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R., Sutre, G.: Software Verification with BLAST. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol.\u00a02648, pp. 235\u2013239. Springer, Heidelberg (2003)"},{"issue":"8","key":"2_CR24","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1145\/361082.361093","volume":"17","author":"L. Lamport","year":"1974","unstructured":"Lamport, L.: A new solution of Dijkstra\u2019s concurrent programming problem. Communications of the ACM\u00a017(8), 435\u2013455 (1974)","journal-title":"Communications of the ACM"},{"key":"2_CR25","unstructured":"Manna, Z., Pnueli, A.: Clocked transition systems. Technical Report STAN-CS-TR-96-1566, Computer Science Department, Stanford University (1996)"}],"container-title":["Lecture Notes in Computer Science","International Symposium on Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75698-9_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:27:34Z","timestamp":1619519254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75698-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540756972"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75698-9_2","relation":{},"subject":[]}}