{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:20:40Z","timestamp":1740122440263,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,3,10]],"date-time":"2016-03-10T00:00:00Z","timestamp":1457568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,3,10]],"date-time":"2016-03-10T00:00:00Z","timestamp":1457568000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-SC0002153"],"award-info":[{"award-number":["DE-SC0002153"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006227","name":"Lawrence Livermore National Laboratory, Office of Science","doi-asserted-by":"publisher","award":["B580360"],"award-info":[{"award-number":["B580360"]}],"id":[{"id":"10.13039\/100006227","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0953478"],"award-info":[{"award-number":["CCF-0953478"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1217582"],"award-info":[{"award-number":["CCF-1217582"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1420866"],"award-info":[{"award-number":["CCF-1420866"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10515-016-0190-1","type":"journal-article","created":{"date-parts":[[2016,3,10]],"date-time":"2016-03-10T09:20:59Z","timestamp":1457601659000},"page":"865-904","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Lightweight control-flow instrumentation and postmortem analysis in support of debugging"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7670-7374","authenticated-orcid":false,"given":"Peter","family":"Ohmann","sequence":"first","affiliation":[]},{"given":"Ben","family":"Liblit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"190_CR1","doi-asserted-by":"publisher","unstructured":"Agrawal, H., Horgan, J.R.: Dynamic program slicing. In: Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation, PLDI \u201990, pp. 246\u2013256. ACM, New York, NY, USA (1990). doi:\n                    10.1145\/93542.93576","DOI":"10.1145\/93542.93576"},{"key":"190_CR2","doi-asserted-by":"publisher","unstructured":"Agrawal, H., DeMillo. R.A., Spafford, E.H.: Dynamic slicing in the presence of unconstrained pointers. In: Proceedings of the Symposium on Testing, Analysis, and Verification, TAV4, pp. 60\u201373. ACM, New York, NY, USA (1991). doi:\n                    10.1145\/120807.120813","DOI":"10.1145\/120807.120813"},{"key":"190_CR3","doi-asserted-by":"publisher","unstructured":"Ammons, G., Ball, T., Larus, J.R.: Exploiting hardware performance counters with flow and context sensitive profiling. In: Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementation, PLDI \u201997, pp. 85\u201396, ACM, New York, NY, USA (1997). doi:\n                    10.1145\/258915.258924","DOI":"10.1145\/258915.258924"},{"issue":"8","key":"190_CR4","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TSE.2003.1223646","volume":"29","author":"P Anderson","year":"2003","unstructured":"Anderson, P., Reps, T., Teitelbaum, T.: Design and implementation of a fine-grained software inspection tool. IEEE Trans. Softw. Eng. 29(8), 721\u2013733 (2003). doi:\n                    10.1109\/TSE.2003.1223646","journal-title":"IEEE Trans. Softw. Eng."},{"key":"190_CR5","doi-asserted-by":"publisher","unstructured":"Apiwattanapong, T., Harrold, M.J.: Selective path profiling. In: Proceedings of the 2002 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE \u201902, pp. 35\u201342, ACM, New York, NY, USA (2002). doi:\n                    10.1145\/586094.586104","DOI":"10.1145\/586094.586104"},{"key":"190_CR6","doi-asserted-by":"crossref","unstructured":"Arumuga Nainar, P., Liblit, B.: Adaptive bug isolation. In: Kramer, J., Bishop, J., Devanbu, P.T., Uchitel, S. (eds) ICSE (1), pp. 255\u2013264, ACM (2010)","DOI":"10.1145\/1806799.1806839"},{"key":"190_CR7","unstructured":"Ball, T., Larus, J.R.: Efficient path profiling. In: Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarchitecture, MICRO 29, pp. 46\u201357, IEEE Computer Society, Washington, DC, USA (1996). \n                    http:\/\/dl.acm.org\/citation.cfm?id=243846.243857"},{"issue":"3","key":"190_CR8","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.scico.2006.04.007","volume":"62","author":"D Binkley","year":"2006","unstructured":"Binkley, D., Danicic, S., Gyim\u00f3thy, T., Harman, M., Kiss, A., Korel, B.: A formalisation of the relationship between forms of program slicing. Sci. Comput. Program 62(3), 228\u2013252 (2006). doi:\n                    10.1016\/j.scico.2006.04.007","journal-title":"Sci. Comput. Program"},{"issue":"2","key":"190_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1217295.1217297","volume":"16","author":"D Binkley","year":"2007","unstructured":"Binkley, D., Gold, N., Harman, M.: An empirical study of static program slice size. ACM Trans. Softw. Eng. Methodol. 16(2), 8 (2007). doi:\n                    10.1145\/1217295.1217297","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"190_CR10","doi-asserted-by":"publisher","unstructured":"Bond, M.D., McKinley, K.S.: Probabilistic calling context. In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications, OOPSLA \u201907, pp. 97\u2013112, ACM, New York, NY, USA (2007) doi:\n                    10.1145\/1297027.1297035","DOI":"10.1145\/1297027.1297035"},{"key":"190_CR11","doi-asserted-by":"publisher","unstructured":"Bowring, J., Orso, A., Harrold, M.J.: Monitoring deployed software using software tomography. In: Proceedings of the 2002 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE \u201902, pp. 2\u20139, ACM, New York, NY, USA (2002). doi:\n                    10.1145\/586094.586099","DOI":"10.1145\/586094.586099"},{"key":"190_CR12","doi-asserted-by":"publisher","unstructured":"Cao, Y., Zhang, H., Ding, S. SymCrash: Selective recording for reproducing crashes. In: Crnkovic, I., Chechik, M., Gr\u00fcnbacher, P. (eds.) ACM\/IEEE International Conference on Automated Software Engineering, ASE \u201914, Vasteras, Sweden, pp. 791\u2013802, ACM (September 15\u201319, 2014). doi:\n                    10.1145\/2642937.2642993","DOI":"10.1145\/2642937.2642993"},{"key":"190_CR13","doi-asserted-by":"publisher","unstructured":"Clause, J., Orso, A.: A technique for enabling and supporting debugging of field failures. In: Proceedings of the 29th International Conference on Software Engineering, ICSE \u201907, pp. 261\u2013270, IEEE Computer Society, Washington, DC, USA (2007) doi:\n                    10.1109\/ICSE.2007.10","DOI":"10.1109\/ICSE.2007.10"},{"key":"190_CR14","doi-asserted-by":"publisher","unstructured":"Crameri, O., Bianchini, R., Zwaenepoel, W.: Striking a new balance between program instrumentation and debugging time. In: Proceedings of the Sixth Conference on Computer Systems, EuroSys \u201911, pp. 199\u2013214, ACM, New York, NY, USA (2011). doi:\n                    10.1145\/1966445.1966464","DOI":"10.1145\/1966445.1966464"},{"issue":"4","key":"190_CR15","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H Do","year":"2005","unstructured":"Do, H., Elbaum, S.G., Rothermel, G.: Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact. Empir. Softw. Eng. Int. J. 10(4), 405\u2013435 (2005)","journal-title":"Empir. Softw. Eng. Int. J."},{"issue":"3","key":"190_CR16","first-page":"29","volume":"10","author":"B Gauf","year":"2007","unstructured":"Gauf, B., Dustin, E.: The case for automated software testing. J. Softw. Technol. 10(3), 29\u201334 (2007)","journal-title":"J. Softw. Technol."},{"issue":"4","key":"190_CR17","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1145\/261640.261644","volume":"6","author":"R Gupta","year":"1997","unstructured":"Gupta, R., Soffa, M.L., Howard, J.: Hybrid slicing: integrating dynamic information with static analysis. ACM Trans. Softw. Eng. Methodol. 6(4), 370\u2013397 (1997). doi:\n                    10.1145\/261640.261644","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"1","key":"190_CR18","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1147\/sj.411.0004","volume":"41","author":"B Hailpern","year":"2002","unstructured":"Hailpern, B., Santhanam, P.: Software debugging, testing, and verification. IBM Syst. J. 41(1), 4\u201312 (2002). doi:\n                    10.1147\/sj.411.0004","journal-title":"IBM Syst. J."},{"key":"190_CR19","doi-asserted-by":"publisher","unstructured":"Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. In: Proceedings of the ACM SIGPLAN 1988 Conference on Programming Language Design and Implementation, PLDI \u201988, pp. 35\u201346, ACM, New York, NY, USA (1988). doi:\n                    10.1145\/53990.53994","DOI":"10.1145\/53990.53994"},{"issue":"1","key":"190_CR20","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/TSE.2009.66","volume":"36","author":"S Horwitz","year":"2010","unstructured":"Horwitz, S., Liblit, B., Polishchuk, M.: Better debugging via output tracing and callstack-sensitive slicing. IEEE Trans. Softw. Eng. 36(1), 7\u201319 (2010). doi:\n                    10.1109\/TSE.2009.66","journal-title":"IEEE Trans. Softw. Eng."},{"key":"190_CR21","unstructured":"Jaramillo, C., Gupta, R., Soffa, M.L.: FULLDOC: A full reporting debugger for optimized code. In: Proceedings of the 7th International Symposium on Static Analysis, SAS \u201900, pp. 240\u2013259, Springer-Verlag, London, UK (2000). \n                    http:\/\/dl.acm.org\/citation.cfm?id=647169.718156"},{"key":"190_CR22","unstructured":"Jin, W., Orso, A.: BugRedux: reproducing field failures for in-house debugging. In: Proceedings of the 2012 International Conference on Software Engineering, ICSE 2012, pp. 474\u2013484, IEEE Press, Piscataway, NJ, USA (2012). \n                    http:\/\/dl.acm.org\/citation.cfm?id=2337223.2337279"},{"issue":"1\u20135","key":"190_CR23","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1016\/0165-6074(93)90203-W","volume":"38","author":"M Kamkar","year":"1993","unstructured":"Kamkar, M., Fritzson, P., Shahmehri, N.: Three approaches to interprocedural dynamic slicing. Microprocess. Microprogr. 38(1\u20135), 625\u2013636 (1993)","journal-title":"Microprocess. Microprogr."},{"issue":"3","key":"190_CR24","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/0020-0190(88)90054-3","volume":"29","author":"B Korel","year":"1988","unstructured":"Korel, B., Laski, J.: Dynamic program slicing. Inf. Process. Lett. 29(3), 155\u2013163 (1988). doi:\n                    10.1016\/0020-0190(88)90054-3","journal-title":"Inf. Process. Lett."},{"issue":"3","key":"190_CR25","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0164-1212(90)90094-3","volume":"13","author":"B Korel","year":"1990","unstructured":"Korel, B., Laski, J.: Dynamic slicing of computer programs. J. Syst. Softw. 13(3), 187\u2013195 (1990). doi:\n                    10.1016\/0164-1212(90)90094-3","journal-title":"J. Syst. Softw."},{"key":"190_CR26","doi-asserted-by":"publisher","unstructured":"Krinke, J.: Context-sensitivity matters, but context does not. In: Proceedings of the Source Code Analysis and Manipulation, Fourth IEEE International Workshop, SCAM \u201904, pp. 29\u201335, IEEE Computer Society, Washington, DC, USA. (2004). doi:\n                    10.1109\/SCAM.2004.7","DOI":"10.1109\/SCAM.2004.7"},{"key":"190_CR27","unstructured":"Lattner, C., Adve, V.: LLVM: A compilation framework for lifelong program analysis & transformation. In: Proceedings of the 2004 International Symposium on Code Generation and Optimization (CGO\u201904), Palo Alto, CA (2004)"},{"key":"190_CR28","doi-asserted-by":"publisher","unstructured":"Lei, Y., Mao, X., Dai, Z., Wang, C.: Effective statistical fault localization using program slices. In: Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications Conference, COMPSAC \u201912, pp. 1\u201310, IEEE Computer Society, Washington, DC, USA (2012). doi:\n                    10.1109\/COMPSAC.2012.9","DOI":"10.1109\/COMPSAC.2012.9"},{"key":"190_CR29","doi-asserted-by":"publisher","unstructured":"Manevich, R., Sridharan, M., Adams, S., Das, M., Yang, Z.: PSE: explaining program failures via postmortem static analysis. In: Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering, SIGSOFT \u201904\/FSE-12, pp. 63\u201372, ACM, New York, NY, USA (2004). doi:\n                    10.1145\/1029894.1029907","DOI":"10.1145\/1029894.1029907"},{"key":"190_CR30","doi-asserted-by":"publisher","unstructured":"Mars, J., Hundt, R.: Scenario based optimization: a framework for statically enabling online optimizations. In: Proceedings of the CGO 2009, The Seventh International Symposium on Code Generation and Optimization, pp. 169\u2013179, IEEE Computer Society, Seattle, WA, USA (March 22\u201325, 2009). doi:\n                    10.1109\/CGO.2009.24\n                    \n                  , \n                    http:\/\/doi.ieeecomputersociety.org\/10.1109\/CGO.2009.24","DOI":"10.1109\/CGO.2009.24"},{"key":"190_CR31","unstructured":"Melski, D., Reps, T.W.: Interprocedural path profiling. In: Proceedings of the 8th International Conference on Compiler Construction, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS\u201999, UK, CC \u201999, pp. 47\u201362, Springer-Verlag, London, UK (1999). \n                    http:\/\/dl.acm.org\/citation.cfm?id=647475.727620"},{"key":"190_CR32","unstructured":"Mulhern, A., Liblit, B.: Effective slicing: a generalization of full and relevant slicing. Tech. Rep. 1639, University of Wisconsin-Madison (2008)"},{"key":"190_CR33","doi-asserted-by":"publisher","unstructured":"Nishimatsu, A., Jihira, M., Kusumoto S., Inoue, K.: Call-mark slicing: an efficient and economical way of reducing slice. In: Proceedings of the 21st International Conference on Software Engineering, ICSE \u201999, pp. 422\u2013431, ACM, New York, NY, USA (1999). doi:\n                    10.1145\/302405.302674","DOI":"10.1145\/302405.302674"},{"key":"190_CR34","doi-asserted-by":"crossref","unstructured":"Ohmann P., Liblit, B.: Lightweight control-flow instrumentation and postmortem analysis in support of debugging. In: 28th International Conference on Automated Software Engineering, p. 2013, ASE: IEEE and ACM, Palo Alto, CA (2013)","DOI":"10.1109\/ASE.2013.6693096"},{"key":"190_CR35","doi-asserted-by":"publisher","unstructured":"Orso, A., Liang, D., Harrold, M.J., Lipton, R.: Gamma system: continuous evolution of software after deployment. In: Proceedings of the 2002 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA \u201902, pp. 65\u201369, ACM, New York, NY, USA (2002). doi:\n                    10.1145\/566172.566182","DOI":"10.1145\/566172.566182"},{"key":"190_CR36","doi-asserted-by":"publisher","unstructured":"Ottenstein, K.J., Ottenstein, L.M.: The program dependence graph in a software development environment. In: Proceedings of the First ACM SIGSOFT\/SIGPLAN Software Engineering Symposium on Practical Software Development Environments, SDE 1, pp. 177\u2013184, ACM, New York, NY, USA (1984). doi:\n                    10.1145\/800020.808263","DOI":"10.1145\/800020.808263"},{"key":"190_CR37","doi-asserted-by":"crossref","unstructured":"R\u00f6\u00dfler, J., Zeller, A., Fraser, G., Zamfir, C., Candea, G.: Reconstructing core dumps. In: ICST \u201913: Proceedings of the Sixth IEEE International Conference on Software Testing, Verification and Validation (2013)","DOI":"10.1109\/ICST.2013.18"},{"key":"190_CR38","unstructured":"Rothermel, G., Elbaum, S., Kinneer, A., Do, H.: Software-artifact infrastructure repository. \n                    http:\/\/sir.unl.edu\/portal\/\n                    \n                   (2006)"},{"key":"190_CR39","doi-asserted-by":"publisher","unstructured":"Sumner, W.N., Zheng, Y., Weeratunge, D., Zhang, X.: Precise calling context encoding. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, Volume 1, ICSE \u201910, pp 525\u2013534, ACM, New York, NY, USA (2010). doi:\n                    10.1145\/1806799.1806875","DOI":"10.1145\/1806799.1806875"},{"key":"190_CR40","unstructured":"Takada, T., Ohata, F., Inoue, K.: Dependence-cache slicing: A program slicing method using lightweight dynamic information. In: Proceedings of the 10th International Workshop on Program Comprehension, IWPC \u201902, pp 169, IEEE Computer Society, Washington, DC, USA (2002). \n                    http:\/\/dl.acm.org\/citation.cfm?id=580131.857015"},{"key":"190_CR41","unstructured":"Tassey, G.: The economic impacts of inadequate infrastructure for software testing. National Institute of Standards and Technology, RTI Project 7007(011) (2002)"},{"key":"190_CR42","unstructured":"Tice, C.M.: Non-transparent debugging of optimized code. PhD Thesis, EECS Department, University of California, Berkeley, \n                    http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/1999\/6232.html\n                    \n                   (1999)"},{"key":"190_CR43","doi-asserted-by":"publisher","unstructured":"Vaswani, K., Nori, A.V., Chilimbi, T, M.: Preferential path profiling: compactly numbering interesting paths. In: Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL \u201907, pp 351\u2013362, ACM, New York, NY, USA (2007). doi:\n                    10.1145\/1190216.1190268","DOI":"10.1145\/1190216.1190268"},{"key":"190_CR44","doi-asserted-by":"publisher","unstructured":"Venkatesh, G.A.: The semantic approach to program slicing. In: Proceedings of the ACM SIGPLAN 1991 Conference on Programming Language Design and Implementation, PLDI \u201991, pp 107\u2013119, ACM, New York, NY, USA (1991). doi:\n                    10.1145\/113445.113455","DOI":"10.1145\/113445.113455"},{"key":"190_CR45","doi-asserted-by":"publisher","unstructured":"Weeratunge, D., Zhang, X., Jagannathan, S.: Analyzing multicore dumps to facilitate concurrency bug reproduction. In: Proceedings of the Fifteenth Edition of ASPLOS on Architectural Support for Programming Languages and Operating Systems, ASPLOS XV, pp. 155\u2013166, ACM, New York, NY, USA (2010). doi:\n                    10.1145\/1736020.1736039","DOI":"10.1145\/1736020.1736039"},{"issue":"4","key":"190_CR46","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M Weiser","year":"1984","unstructured":"Weiser, M.: Program slicing. IEEE Trans. Softw. Eng. 10(4), 352\u2013357 (1984). doi:\n                    10.1109\/TSE.1984.5010248","journal-title":"IEEE Trans. Softw. Eng."},{"key":"190_CR47","doi-asserted-by":"publisher","unstructured":"Yuan, D., Mai, H., Xiong, W., Tan, L., Zhou, Y., Pasupathy, S.: Sherlog: error diagnosis by connecting clues from run-time logs. In: Proceedings of the Fifteenth Edition of ASPLOS on Architectural Support for Programming Languages and Operating Systems, ASPLOS XV, pp. 143\u2013154, ACM, New York, NY, USA (2010). doi:\n                    10.1145\/1736020.1736038","DOI":"10.1145\/1736020.1736038"},{"key":"190_CR48","doi-asserted-by":"publisher","unstructured":"Yuan, D., Zheng, J., Park, S., Zhou, Y., Savage, S.: Improving software diagnosability via log enhancement. In: Proceedings of the Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XVI, pp 3\u201314, ACM, New York, NY, USA (2011). doi:\n                    10.1145\/1950365.1950369","DOI":"10.1145\/1950365.1950369"},{"key":"190_CR49","doi-asserted-by":"publisher","unstructured":"Zamfir, C., Candea, G.: Execution synthesis: a technique for automated software debugging. In: Proceedings of the 5th European Conference on Computer Systems, EuroSys \u201910, pp 321\u2013334, ACM, New York, NY, USA (2010). doi:\n                    10.1145\/1755913.1755946","DOI":"10.1145\/1755913.1755946"},{"key":"190_CR50","doi-asserted-by":"publisher","unstructured":"Zhang, X., Gupta, R.: Cost effective dynamic program slicing. In: Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, PLDI \u201904, pp 94\u2013106, ACM, New York, NY, USA (2004). doi:\n                    10.1145\/996841.996855","DOI":"10.1145\/996841.996855"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-016-0190-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-016-0190-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-016-0190-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-016-0190-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T08:35:18Z","timestamp":1589704518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-016-0190-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,10]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["190"],"URL":"https:\/\/doi.org\/10.1007\/s10515-016-0190-1","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2016,3,10]]},"assertion":[{"value":"30 November 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}