{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:52:28Z","timestamp":1725691948306},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315879"},{"type":"electronic","value":"9783642315886"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31588-6_61","type":"book-chapter","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T02:21:58Z","timestamp":1342837318000},"page":"475-482","source":"Crossref","is-referenced-by-count":0,"title":["Behavior Analysis of Software Systems Based on Petri Net Slicing"],"prefix":"10.1007","author":[{"given":"Jiaying","family":"Ma","sequence":"first","affiliation":[]},{"given":"Wei","family":"Han","sequence":"additional","affiliation":[]},{"given":"Zuohua","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971392","volume-title":"Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations","author":"U.M. Ascher","year":"1998","unstructured":"Ascher, U.M., Petzold, L.R.: Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations. Society for Industrial & Applied Mathematis, Philadelphia (1998)"},{"issue":"11","key":"61_CR2","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/32.106975","volume":"17","author":"G.S. Avrunin","year":"1991","unstructured":"Avrunin, G.S., Buy, U.A., Corbett, J.C., Dillon, L.K., Wileden, J.C.: Automated Analysis of Concurrent Systems With The Constrained Expression Toolset. IEEE Transactions on Software Engineering\u00a017(11), 1204\u20131222 (1991)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"61_CR3","first-page":"71","volume-title":"Proc. of the 16th Nordic Workshop on Programming Theory","author":"I. Br\u00fcckner","year":"2004","unstructured":"Br\u00fcckner, I.: Slicing CSP-OZ Specifications. In: Proc. of the 16th Nordic Workshop on Programming Theory, pp. 71\u201373. Uppsala University, Sweden (2004)"},{"key":"61_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/11415787_24","volume-title":"ZB 2005: Formal Specification and Development in Z and B","author":"I. Br\u00fcckner","year":"2005","unstructured":"Br\u00fcckner, I., Wehrheim, H.: Slicing Object-Z Specifications for Verification. In: Treharne, H., King, S., C. Henson, M., Schneider, S. (eds.) ZB 2005. LNCS, vol.\u00a03455, pp. 414\u2013433. Springer, Heidelberg (2005)"},{"key":"61_CR5","unstructured":"Chang, C.K., Wang, H.: A Slicing Algorithm of Concurrency Modeling Based on Petri Nets. In: Proc. of the Intermational Conf. on Parallel Processing 1986, pp. 789\u2013792. IEEE Computer Society Press (1986)"},{"issue":"5","key":"61_CR6","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1145\/186025.186051","volume":"16","author":"E.M. Clarke","year":"1994","unstructured":"Clarke, E.M., Grumberg, O., Long, D.E.: Model Checking and Abstraction. ACM Transactions on Programming Language Systems\u00a016(5), 1512\u20131542 (1994)","journal-title":"ACM Transactions on Programming Language Systems"},{"key":"61_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF00289519","volume":"2","author":"E.W. Dijkstra","year":"1971","unstructured":"Dijkstra, E.W.: Hierarchical Ordering of Sequential Processes. Acta Informat.\u00a02, 115\u2013138 (1971)","journal-title":"Acta Informat."},{"key":"61_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/3-540-63531-9_30","volume-title":"Software Engineering - ESEC-FSE \u201997","author":"M.P.E. Heimdahl","year":"1997","unstructured":"Heimdahl, M.P.E., Whalen, M.W.: Reduction and Slicing of Hierarchical State Machines. In: Jazayeri, M. (ed.) ESEC\/FSE 1997. LNCS, vol.\u00a01301, pp. 450\u2013467. Springer, Heidelberg (1997)"},{"key":"61_CR9","unstructured":"Lee, J.: Scheduling Analysis with Resources Share Using The Transitive Matrix Based on P-invariant. In: Proceedings of the 41st SICE Annual Conference 2002, pp. 5\u20137 (2002)"},{"key":"61_CR10","first-page":"131","volume":"32","author":"W.J. Lee","year":"2000","unstructured":"Lee, W.J., Kim, H.N.: A Slicing-Based Approach to Enhance Petri Net Reachability Analysis. Journal of Research and Practice in Information Technology\u00a032, 131\u2013143 (2000)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"61_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.entcs.2008.12.026","volume":"223","author":"M. Llorens","year":"2008","unstructured":"Llorens, M., Oliver, J., et al.: Dynamic Slicing Techniques for Petri Nets. Electronic Notes in the Theoretical Computer Science\u00a0223, 1\u201312 (2008)","journal-title":"Electronic Notes in the Theoretical Computer Science"},{"key":"61_CR12","doi-asserted-by":"crossref","unstructured":"Long, D.L., Clarke, L.A.: Task Interaction Graphs for Concurrency Analysis. In: Proceedings of 11th ICSE, Pittsburgh, Penn., USA, pp. 44\u201352 (1989)","DOI":"10.1145\/74587.74592"},{"key":"61_CR13","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T. Murata","year":"1989","unstructured":"Murata, T.: Petri Nets: Properties, Analysis and Applications. Proceedings of the IEEE\u00a077, 541\u2013580 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"61_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-540-77566-9_38","volume-title":"SOFSEM 2008: Theory and Practice of Computer Science","author":"A. Rakow","year":"2008","unstructured":"Rakow, A.: Slicing Petri Nets with an Application to Workflow Verification. In: Geffert, V., Karhum\u00e4ki, J., Bertoni, A., Preneel, B., N\u00e1vrat, P., Bielikov\u00e1, M. (eds.) SOFSEM 2008. LNCS, vol.\u00a04910, pp. 436\u2013447. Springer, Heidelberg (2008)"},{"key":"61_CR15","unstructured":"Rakow, A.: Slicing Petri Nets. In: Proceeding of the Workshop on FABPWS 2007, Satellite Event, Siedlce, pp. 55\u201376 (2007)"},{"key":"61_CR16","doi-asserted-by":"crossref","unstructured":"Sloane, A.M., Holdsworth, J.: Beyond Traditional Program Slicing. In: Proc. of the International Symp. on Software Testing and Analysis, San Diego, CA, pp. 180\u2013186 (1996)","DOI":"10.1145\/226295.226315"},{"key":"61_CR17","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M. Weiser","year":"1984","unstructured":"Weiser, M.: Program Slicing. IEEE Transactions on Software Engineering\u00a010, 352\u2013357 (1984)","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31588-6_61.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:14:30Z","timestamp":1620130470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31588-6_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315879","9783642315886"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31588-6_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}