{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:26:57Z","timestamp":1761989217751,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":7,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811308956"},{"type":"electronic","value":"9789811308963"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0896-3_29","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T11:06:46Z","timestamp":1528715206000},"page":"294-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Type Analysis and Automatic Static Detection of Infeasible Paths"],"prefix":"10.1007","author":[{"given":"Fuping","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Wenjing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Gou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/978-3-642-31424-7_62","volume-title":"Computer Aided Verification","author":"S Arlt","year":"2012","unstructured":"Arlt, S., Sch\u00e4f, M.: Joogie: infeasible code detection for Java. In: Madhusudan, P., Seshia, Sanjit A. (eds.) CAV 2012. LNCS, vol. 7358, pp. 767\u2013773. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31424-7_62"},{"key":"29_CR2","unstructured":"Chen, R., Zhang, G., Xiaowei, L.I.: Detection of infeasible path in procedure. Comput. Eng. 32(16), 86\u201388 (2006)"},{"key":"29_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-45422-6_5","volume-title":"Evaluation of Novel Approaches to Software Engineering","author":"S Ding","year":"2013","unstructured":"Ding, S., Tan, H.B.K.: Detection of infeasible paths: approaches and challenges. In: Maciaszek, L.A., Filipe, J. (eds.) ENASE 2012. CCIS, vol. 410, pp. 64\u201378. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-45422-6_5"},{"issue":"5","key":"29_CR4","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1049\/iet-sen.2009.0092","volume":"4","author":"D Gong","year":"2010","unstructured":"Gong, D., Yao, X.: Automatic detection of infeasible paths in software testing. Softw. IET 4(5), 361\u2013370 (2010)","journal-title":"Softw. IET"},{"key":"29_CR5","unstructured":"Hedley, D., Hennell, M.A.: The Causes and Effects of Infeasible Paths in Computer Programs, pp. 259\u2013267 (1985)"},{"issue":"8","key":"29_CR6","first-page":"1555","volume":"43","author":"HY Wang","year":"2015","unstructured":"Wang, H.Y., Jiang, S.J., Wang, X.Y., Ju, X.L., Zhang, Y.M.: An approach for detecting infeasible paths based on sub-path expansion. Tien Tzu Hsueh Pao\/Acta Electronica Sin. 43(8), 1555\u20131560 (2015)","journal-title":"Tien Tzu Hsueh Pao\/Acta Electronica Sin."},{"key":"29_CR7","unstructured":"Yu, Q.-Y., Luo, Y., Yang, H.: Improved static approach of infeasible paths in program. J. Univ. South China (Sci. Technol.) 4, 68\u201373 (2014)"}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0896-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T12:43:49Z","timestamp":1537447429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0896-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811308956","9789811308963"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0896-3_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"GSKI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Geo-Spatial Knowledge and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gski2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.grmse2017.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}