{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T01:53:27Z","timestamp":1770429207970,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1007\/s11219-005-6214-x","type":"journal-article","created":{"date-parts":[[2005,4,19]],"date-time":"2005-04-19T07:46:15Z","timestamp":1113896775000},"page":"129-153","source":"Crossref","is-referenced-by-count":9,"title":["The Efficiency of Critical Slicing in Fault Localization"],"prefix":"10.1007","volume":"13","author":[{"given":"Z. A.","family":"Al-Khanjari","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. R.","family":"Woodward","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haider Ali","family":"Ramadhan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N. S.","family":"Kutti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6214_CR1","unstructured":"Acree, A.T. 1980. On mutation, School of Information and Computer Science, Ph.D. Thesis, Georgia Institute of Technology, Atlanta, Georgia."},{"key":"6214_CR2","doi-asserted-by":"crossref","unstructured":"Acree, A.T., Budd, T.A., Lipton, R.J., DeMillo, R.A., and Sayward, F.G. 1979. Mutation analysis, School of Information and Computer Science, Technical Report, Georgia Institute of Technology, Atlanta, Georgia.","DOI":"10.21236\/ADA076575"},{"key":"6214_CR3","unstructured":"Agarwal, H., DeMillo, R., Hataway, R., Wm. Hsu., Krauser E., Martin, R.J., Mathur, A., and Spafford, E. 1989. Design of mutants operators for the C programming language, Software Engineering Research Center, Technical Report SERC-TR-41-P, Purdue University, West Lafayette, Indiana 47907."},{"key":"6214_CR4","unstructured":"Al-Khanjari, Z.A. 1995. Mutation testing using mothra, Dissertation for the Degree of Master of Science (Software Engineering), Supervised by Dr Martin Woodward, College of Science, Liverpool University, UK."},{"key":"6214_CR5","unstructured":"Al-Khanjari, Z.A., Woodward, M.R., Ramadhan, H., and Shihab, K. 2002. Faults localization with critical slicing, The 2002 International Multiconference in Computer Science, Monte Carlo Resort, Las Vegas, Nevada, USA, June 24\u201327, 2002."},{"key":"6214_CR6","doi-asserted-by":"crossref","unstructured":"Binkley, D.W. and Gallagher, K.B. 1996. Program slicing. Advances in Computers, eds Marvin Zelkowitz, Vol. 43. Academic Press, San Diego, CA.","DOI":"10.1016\/S0065-2458(08)60641-5"},{"key":"6214_CR7","doi-asserted-by":"crossref","unstructured":"Binkley, D.W., Harman, N., Raszewski, L.R., and Smith, C. 2000. An empirical study of amorphous slicing as a program comprehension support tool. In 8th International Workshop on Program Comprehension (IWPC 2000),Limerick, Ireland, pp. 161\u2013170.","DOI":"10.1109\/WPC.2000.852490"},{"key":"6214_CR8","unstructured":"Budd, T.A. 1980. Mutation analysis of program test data, Ph.D. Thesis, Yale University, New Haven, Connecticut."},{"key":"6214_CR9","unstructured":"Canfora, G., Cimitile, A., and De Lucia, A. 1998. Conditioned program slicing, Information and Software Technology special issue on Program Slicing, 40(11\u201312), pp. 595\u2013607, December 1998."},{"key":"6214_CR10","unstructured":"Choi, J.D., Miller, B., and Netzer, P. 1988. Techniques for debugging parallel programs, Technical Report 786, Univ. Wisconsin\u2013Madison."},{"key":"6214_CR11","unstructured":"De Lucia, A. 2001. Program slicing: Methods and applications, In IEEE International Workshop on source Code Analysis and Manipulation, IEEE Computer Society Press, Florence, Italy, pp. 142\u2013149."},{"issue":"4","key":"6214_CR12","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"R.A. DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., and Sayward, F.G. 1978. Hints on test data selection help for the practicing programmer,IEEE Computer 11(4): 34\u201341.","journal-title":"IEEE Computer"},{"key":"6214_CR13","doi-asserted-by":"crossref","unstructured":"DeMillo, R.A., Guindi, D.S., McCracken, W.M., Offutt, A.J., and King, K.N. 1988. An extended overview of the mothra software testing environment, In Proceedings of Second workshop on Software Testing, Verification and Reliability, Banff, Canada, IEEE Computer Society, pp. 142\u2013151.","DOI":"10.1109\/WST.1988.5369"},{"key":"6214_CR14","doi-asserted-by":"crossref","unstructured":"DeMillo, R. 1989. Test adequacy and program mutation, In Proceedings of 11th International Conference on Software Engineering. Pittsburg, PA, May 16\u201318, 1989, IEEE Computer Society Press, pp. 355\u2013356.","DOI":"10.1109\/ICSE.1989.714449"},{"key":"6214_CR15","doi-asserted-by":"crossref","unstructured":"DeMillo, R. and Offut, A.J. 1991. Constraint-based automatic test data generation, IEEE Transactions on Software Engineering, SE-17(9), September 1991, pp. 900\u2013910.","DOI":"10.1109\/32.92910"},{"key":"6214_CR16","doi-asserted-by":"crossref","unstructured":"DeMillo, R.A., Pan, H., and Spafford, E.H. 1996. Critical slicing for software fault localization, Conference Proceedings, ISSTA, San Diego, California, USA.","DOI":"10.1145\/229000.226310"},{"key":"6214_CR17","doi-asserted-by":"crossref","unstructured":"Field, J., Ramalingam, G., and Tip, F. 1995. Parametric program slicing, In 22nd Symposium on Principles of Programming Languages (POPL\u201995), January 22\u201325, 1995, pp. 379\u2013392.","DOI":"10.1145\/199448.199534"},{"key":"6214_CR18","doi-asserted-by":"crossref","unstructured":"Fleyshgakker, V.N. and Weiss, S.N. 1994. Efficient mutation analysis: A new approach, In Proceedings of the 1994 International Symposium on Software Testing and Analysis (ISSTA), Seattle, Washington, USA, pp. 185-195.","DOI":"10.1145\/186258.187179"},{"issue":"8","key":"6214_CR19","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1109\/32.83912","volume":"17","author":"K.B. Gallagher","year":"1991","unstructured":"Gallagher, K.B. and Lyle, J.R. 1991. Using program slicing in software maintenance, IEEE Transactions Software Engineering 17(8): 751\u2013761.","journal-title":"IEEE Transactions Software Engineering"},{"issue":"4","key":"6214_CR20","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","volume":"3","author":"R.G. Hamlet","year":"1977","unstructured":"Hamlet, R.G. 1977. Testing programs with the aid of a compiler, IEEE Transactions on Software Engineering 3(4): 279\u2013290.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"6214_CR21","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1002\/stvr.4370050303","volume":"5","author":"M. Harman","year":"1995","unstructured":"Harman, M. and Danicic, S. 1995. Using program slicing to simplify testing. Journal of Software Testing, Verification and Reliability 5(3): 143\u2013162.","journal-title":"Journal of Software Testing, Verification and Reliability"},{"key":"6214_CR22","unstructured":"Harman, M. and Danicic, S. 1997. Amorphous program slicing, IEEE International Workshop on program Comprehension (IWPC\u201997), IEEE Computer Society Press, pp. 70\u201379."},{"issue":"3","key":"6214_CR23","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/swf.41","volume":"2","author":"M. Harman","year":"2001","unstructured":"Harman, M. and Hierons, R.M. 2001. An overview of program slicing, Software Focus 2(3): 85\u201392.","journal-title":"Software Focus"},{"issue":"3","key":"6214_CR24","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/65979.65980","volume":"11","author":"S. Horwitz","year":"1989","unstructured":"Horwitz, S., Prins, J., and Reps, T. 1989. Integrating non-interfering versions of programs, ACM Transactions Programming Languages and Systems 11(3): 345\u2013386.","journal-title":"ACM Transactions Programming Languages and Systems"},{"issue":"1","key":"6214_CR25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/77606.77608","volume":"12","author":"S. Horwitz","year":"1990","unstructured":"Horwitz, S., Reps, T., and Binkley, D. 1990. Interprocedural slicing using dependence graphs, ACM Transactions Programming Languages and Systems 12(1): 35\u201346.","journal-title":"ACM Transactions Programming Languages and Systems"},{"issue":"4","key":"6214_CR26","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.1982.235571","volume":"8","author":"W.E. Howden","year":"1982","unstructured":"Howden, W.E. 1982, Weak mutation testing and completeness of test sets, IEEE Transactions on Software Engineering 8(4): 371\u2013379.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"6214_CR27","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1002\/spe.4380210704","volume":"21","author":"K.N. King","year":"1991","unstructured":"King, K.N. and Offutt, A.J. (1991), A fortran language system for mutation-based software testing, Software-Practice and Experience {21}(7): 685\u2013718.","journal-title":"Software-Practice and Experience"},{"issue":"3","key":"6214_CR28","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/0020-0190(88)90054-3","volume":"29","author":"B. Korel","year":"1988a","unstructured":"Korel, B. and Laski, J. 1988a. Dynamic program slicing, Information Processing Letters 29(3): 155\u2013163.","journal-title":"Information Processing Letters"},{"key":"6214_CR29","doi-asserted-by":"crossref","unstructured":"Korel, B. and Laski, J. 1988b. STAD\u2014a system For testing and debugging: User perspective, In Proc. 2nd Workshop on Software Testing, Verification and Analysis, 19\u201321 July, Banff, Canada, 1988, pp. 13\u201320.","DOI":"10.1109\/WST.1988.5350"},{"key":"6214_CR30","doi-asserted-by":"crossref","unstructured":"Korel, B. and Rilling, J. 1998. Dynamic program slicing methods, Information and Software Technology Special Issue on Program Slicing 40(11\u201312), December 1998, pp. 647\u2013659.","DOI":"10.1016\/S0950-5849(98)00089-5"},{"key":"6214_CR31","unstructured":"Longworth, H.D., Ottenstein, L.M., and Smith, M.R. 1986. The relationship between program complexity and slice complexity during debugging tasks, In Proceedings of IEEE COMPSAC, pp. 383\u2013389."},{"key":"6214_CR32","volume-title":"The Art of Software Testing","author":"G.J. Myers","year":"1979","unstructured":"Myers, G.J. 1979. The Art of Software Testing, John Wiley & Sons, Inc., New York."},{"key":"6214_CR33","doi-asserted-by":"crossref","unstructured":"Offutt, A.J. and Craft, W.M. 1994. Using compiler optimization techniques to detect equivalent mutants, In Conference Proceedings on Software Testing, Verification and Reliability, USA, Vol. 4, No. 3, pp. 131\u2013154.","DOI":"10.1002\/stvr.4370040303"},{"key":"6214_CR34","unstructured":"Ottenstein, L.M. 1992. Using slice profiles and metrics during software maintenance, In Proceedings of the 10th Annual Software Reliability Symposium, pp. 16\u201323."},{"key":"6214_CR35","unstructured":"Ottenstein, K.J. and Ottenstein, L.M. 1984. The program dependence graph in a software development environment, In Proc. ACM SIGSOFT\/SIGPLAN Software Engineering Symposium on Practical Software Development Environments. See also SIGPLAN Notices, Vol. 19, No. 5, pp. 177\u2013184."},{"key":"6214_CR36","unstructured":"Ottenstein, L.M. and Thuss, J.J. 1992. Using slice profiles and metrics as tools in the production of reliable software, Technical Report CS-92-8, Dept. Computer Science, Michigan Technological University. Also published as Technical Report CS-92-115, Dept. Computer Science, Colorado State University."},{"key":"6214_CR37","unstructured":"Pan, H. 1991. Debugging with dynamic instrumentation and test-based knowledge, Technical Report SERCTR-105-p, Software Engineering Research Center, Purdue University, West Lafayette, Indiana."},{"key":"6214_CR38","doi-asserted-by":"crossref","unstructured":"Reps, T. and Yang, W. 1989. The semantic of program slicing and program integration, In Proc. of the Colloquim on Current Issues in Programming Languages, pp. 360\u2013374. Lecture Notes in Computer Science, Vol. 352. Springer-Verlag, New York, NY.","DOI":"10.1007\/3-540-50940-2_47"},{"key":"6214_CR39","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M., and Rsay, G. 1994. Speeding up Slicing, In Proc. of the ACM SIGSOFT\u201994 Synposium on the foundations of Software Engineering.","DOI":"10.1145\/193173.195287"},{"key":"6214_CR40","unstructured":"Tip, F. 1995a. Generation of program analysis tools, Institute for Logic, Language and Computation, University of Amsterdam, Amsterdam, PhD Thesis, ILLC Dissertation Series, 1995\u20135."},{"issue":"3","key":"6214_CR41","first-page":"121","volume":"3","author":"F. Tip","year":"1995b","unstructured":"Tip, F. 1995b. A survey of program slicing techniques, Journal of Programming Languages 3(3): 121\u2013189.","journal-title":"Journal of Programming Languages"},{"key":"6214_CR42","doi-asserted-by":"crossref","unstructured":"Untch, R.H. and Offutt, A.J. 1993. Mutation analysis using mutant schemata, In Proceedings of the 1993 International Symposium on Software Testing and Analysis, Cambridge, Massachusetts, USA, IEEE Computer Society, pp. 139\u2013148.","DOI":"10.1145\/154183.154265"},{"key":"6214_CR43","unstructured":"Venkatesh, G.A. 1991. The semantic approach to program slicing, In ACM SIGPLAN Conference on Programming Language Design and Implementation, 26\u201328, Toronto, Canada. AlsoProcessings in SIGPLAN Notices, Vol. 26, No. 6, pp. 107\u2013119."},{"issue":"5","key":"6214_CR44","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/S0020-7373(85)80054-7","volume":"23","author":"I. Vessey","year":"1985","unstructured":"Vessey, I. 1985. Expertise in debugging computer programs: A process analysis, International Journal of Man-Machine Studies 23(5): 459\u2013494.","journal-title":"International Journal of Man-Machine Studies"},{"key":"6214_CR45","unstructured":"Weiser, M.D. 1979. Program slices: Formal, psychological, and Practical investigations of an automatic program abstraction method, PhD Thesis, University of Michigan, Ann Arbor, MI."},{"key":"6214_CR46","unstructured":"Weiser, M.D. 1981. Program slicing, In Proceedings of the 5th International Conference on Software Engineering, pp. 439\u2013449."},{"issue":"7","key":"6214_CR47","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1145\/358557.358577","volume":"25","author":"M.D. Weiser","year":"1982","unstructured":"Weiser, M.D. 1982. Programmers use slices when debugging, Communications of the ACM 25(7): 446\u2013452.","journal-title":"Communications of the ACM"},{"issue":"4","key":"6214_CR48","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M.D. Weiser","year":"1984","unstructured":"Weiser, M.D. 1984. Program slicing, IEEE Transactions Software Engineering 10(4): 352\u2013357.","journal-title":"IEEE Transactions Software Engineering"},{"key":"6214_CR49","doi-asserted-by":"crossref","unstructured":"Weiss, S.N. and Fleyshgakker, V.N. 1993. Improved serial algorithms for mutation analysis, In Proceedings of the 1993 International Symposium on Software Testing and Analysis, Cambridge, Massachusetts, USA, pp. 149\u2013158.","DOI":"10.1145\/154183.154266"},{"issue":"3","key":"6214_CR50","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/0950-5849(93)90053-6","volume":"35","author":"M.R. Woodward","year":"1993","unstructured":"Woodward, M.R. 1993. Mutation testing-its origin and evolution, Information and Software Technology 35(3): 163\u2013170.","journal-title":"Information and Software Technology"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-005-6214-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-005-6214-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-005-6214-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T00:11:36Z","timestamp":1586218296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-005-6214-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,6]]}},"alternative-id":["6214"],"URL":"https:\/\/doi.org\/10.1007\/s11219-005-6214-x","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}