{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:17:26Z","timestamp":1725455846497},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642342806"},{"type":"electronic","value":"9783642342813"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34281-3_10","type":"book-chapter","created":{"date-parts":[[2012,10,29]],"date-time":"2012-10-29T18:38:09Z","timestamp":1351535889000},"page":"103-118","source":"Crossref","is-referenced-by-count":0,"title":["Quantitative Program Dependence Graphs"],"prefix":"10.1007","author":[{"given":"Chunyan","family":"Mu","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TSE.2009.87","volume":"36","author":"G.K. Baah","year":"2010","unstructured":"Baah, G.K., Podgurski, A., Harrold, M.J.: The probabilistic program dependence graph and its application to fault diagnosis. IEEE Trans. Software Eng.\u00a036(4), 528\u2013545 (2010)","journal-title":"IEEE Trans. Software Eng."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., K\u00f6pf, B., Rybalchenko, A.: Automatic discovery and quantification of information leaks. In: S & P (2009)","DOI":"10.1109\/SP.2009.18"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-12002-2_33","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K. Chatzikokolakis","year":"2010","unstructured":"Chatzikokolakis, K., Chothia, T., Guha, A.: Statistical Measurement of Information Leakage. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol.\u00a06015, pp. 390\u2013404. Springer, Heidelberg (2010)"},{"key":"10_CR4","doi-asserted-by":"crossref","first-page":"321","DOI":"10.3233\/JCS-2007-15302","volume":"15","author":"D. Clark","year":"2007","unstructured":"Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security\u00a015, 321\u2013371 (2007)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"10_CR5","first-page":"3","volume":"28","author":"D. Clark","year":"2002","unstructured":"Clark, D., Hankin, C., Hunt, S.: Information flow for algol-like languages. Comput. Lang.\u00a028(1), 3\u201328 (2002)","journal-title":"Comput. Lang."},{"issue":"3","key":"10_CR6","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J. Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst.\u00a09(3), 319\u2013349 (1987)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Heusser, J., Malacaria, P.: Quantifying information leaks in software. In: ACSAC, pp. 261\u2013269 (2010)","DOI":"10.1145\/1920261.1920300"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Jackson, D., Rollins, E.J.: A new model of program dependences for reverse engineering. In: SIGSOFT FSE, pp. 2\u201310 (1994)","DOI":"10.1145\/195274.195281"},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/210134.210135","volume":"4","author":"D. Jackson","year":"1995","unstructured":"Jackson, D.: Aspect: Detecting bugs with abstract dependences. ACM Trans. Softw. Eng. Methodol.\u00a04(2), 109\u2013145 (1995)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Kuper, R.: Dependency-directed localization of software bugs (1989)","DOI":"10.21236\/ADA210837"},{"key":"10_CR11","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/1190216.1190251","volume-title":"POPL","author":"P. Malacaria","year":"2007","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: POPL, pp. 225\u2013235. ACM Press, Nice (2007)"},{"key":"10_CR12","unstructured":"Mateis, C., Stumptner, M., Wieland, D., Wotawa, F.: Model-based debugging of java programs. In: AADEBUG (2000)"},{"key":"10_CR13","unstructured":"McIver, A., Meinicke, L., Morgan, C.: Hidden-markov program algebra with iteration. CoRR abs\/1102.0333 (2011)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1109\/32.58785","volume":"16","author":"M. Moriconi","year":"1990","unstructured":"Moriconi, M., Winkler, T.C.: Approximate reasoning about the semantic effects of program changes. IEEE Transactions on Software Engineering\u00a016, 980\u2013992 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Mu, C., Clark, D.: An interval-based abstraction for quantifying information flow. In: ENTCS, vol.\u00a059, pp. 119\u2013141. Elsevier (2009)","DOI":"10.1016\/j.entcs.2009.10.009"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Mu, C., Clark, D.: Quantitative analysis of secure information flow via probabilistic semantics. In: ARES, pp. 49\u201357 (2009)","DOI":"10.1109\/ARES.2009.88"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Ottenstein, K.J., Ottenstein, L.M.: The program dependence graph in a software development environment. In: Software Development Environments (SDE), pp. 177\u2013184 (1984)","DOI":"10.1145\/390011.808263"},{"key":"10_CR18","unstructured":"Rudin, W.: Real and Complex Analysis. McGraw-Hill (1966)"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. SIGMOBILE Mob. Comput. Commun. Rev.\u00a05(1), 3\u201355 (1948)","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Weise, D., Crew, R.F., Ernst, M., Steensgaard, B.: Value dependence graphs: Representation without taxation. In: POPL, pp. 297\u2013310 (1994)","DOI":"10.1145\/174675.177907"},{"key":"10_CR21","unstructured":"Weiser, M.D.: Program slices: formal, psychological, and practical investigations of an automatic program abstraction method, aAI8007856 (1979)"},{"key":"10_CR22","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/11504894_49","volume-title":"Innovations in Applied Artificial Intelligence","author":"F. Wotawa","year":"2005","unstructured":"Wotawa, F., Soomro, S.: Fault Localization Based on Abstract Dependencies. In: Ali, M., Esposito, F. (eds.) IEA\/AIE 2005. LNCS (LNAI), vol.\u00a03533, pp. 357\u2013359. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34281-3_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T21:18:47Z","timestamp":1714511927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34281-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642342806","9783642342813"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34281-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}