{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:34:40Z","timestamp":1725568480339},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642165573"},{"type":"electronic","value":"9783642165580"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16558-0_11","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:36:49Z","timestamp":1288690609000},"page":"106-120","source":"Crossref","is-referenced-by-count":0,"title":["Contract-Based Slicing"],"prefix":"10.1007","author":[{"given":"Daniela","family":"da Cruz","sequence":"first","affiliation":[]},{"given":"Pedro Rangel","family":"Henriques","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Sousa Pinto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"High Integrity Software: The SPARK Approach to Safety and Security","author":"J. Barnes","year":"2003","unstructured":"Barnes, J.: High Integrity Software: The SPARK Approach to Safety and Security, 1st edn. Addison Wesley, Reading (March 2003)","edition":"1"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-30569-9_3","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"M. Barnett","year":"2005","unstructured":"Barnett, M., Rustan, K., Leino, M., Schulte, W.: The Spec# programming system: An overview. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol.\u00a03362, pp. 49\u201369. Springer, Heidelberg (2005)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Barros, J., da Cruz, D., Henriques, P.R., Pinto, J.S.: Assertion-based Slicing and Slice Graphs. In: Fiadeiro, J.L., Gnesi, S. (eds.) Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010) (2010)","DOI":"10.1109\/SEFM.2010.18"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Burdy, L., Cheon, Y., Cok, D., Ernst, M., Kiniry, J., Leavens, G., Leino, K., Poll, E.: An overview of jml tools and applications (2003)","DOI":"10.1016\/S1571-0661(04)80810-7"},{"issue":"11-12","key":"11_CR5","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/S0950-5849(98)00086-X","volume":"40","author":"G. Canfora","year":"1998","unstructured":"Canfora, G., Cimitile, A., De Lucia, A.: Conditioned program slicing. Information and Software Technology\u00a040(11-12), 595\u2013608 (1998)","journal-title":"Information and Software Technology"},{"key":"11_CR6","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1145\/372202.372784","volume-title":"SAC 2001: Proceedings of the 2001 ACM Symposium on Applied Computing","author":"I.S. Chung","year":"2001","unstructured":"Chung, I.S., Lee, W.K., Yoon, G.S., Kwon, Y.R.: Program slicing based on specification. In: SAC 2001: Proceedings of the 2001 ACM Symposium on Applied Computing, pp. 605\u2013609. ACM, New York (2001)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/3-540-60973-3_107","volume-title":"FME \u201996: Industrial Benefit and Advances in Formal Methods","author":"J.J. Comuzzi","year":"1996","unstructured":"Comuzzi, J.J., Hart, J.M.: Program slicing using weakest preconditions. In: Gaudel, M.-C., Woodcock, J.C.P. (eds.) FME 1996. LNCS, vol.\u00a01051, pp. 557\u2013575. Springer, Heidelberg (1996)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"da Cruz, D., Henriques, P.R., Pinto, J.S.: Gamaslicer: an Online Laboratory for Program Verification and Analysis. In: Proceedings of the 10th Workshop on Language Descriptions Tools and Applications, LDTA 2010 (2010)","DOI":"10.1145\/1868281.1868284"},{"key":"11_CR9","first-page":"89","volume-title":"IWPC","author":"C. Fox","year":"2001","unstructured":"Fox, C., Danicic, S., Harman, M., Hierons, R.M.: Backward conditioning: A new program specialisation technique and its application to program comprehension. In: IWPC, pp. 89\u201397. IEEE Computer Society, Los Alamitos (2001)"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C.A.R. Hoare","year":"1969","unstructured":"Hoare, C.A.R.: An axiomatic basis for computer programming. Communications of the ACM\u00a012, 576\u2013580 (1969)","journal-title":"Communications of the ACM"},{"issue":"5","key":"11_CR11","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s001650050057","volume":"11","author":"T. Kleymann","year":"1999","unstructured":"Kleymann, T.: Hoare logic and auxiliary variables. Formal Aspects of Computing\u00a011(5), 541\u2013566 (1999)","journal-title":"Formal Aspects of Computing"},{"issue":"10","key":"11_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201ddesign by contract\u201d. Computer\u00a025(10), 40\u201351 (1992)","journal-title":"Computer"},{"key":"11_CR13","first-page":"439","volume-title":"ICSE 1981: Proceedings of the 5th International Conference on Software Engineering","author":"M. Weiser","year":"1981","unstructured":"Weiser, M.: Program slicing. In: ICSE 1981: Proceedings of the 5th International Conference on Software Engineering, Piscataway, NJ, USA, pp. 439\u2013449. IEEE Press, Los Alamitos (1981)"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1050849.1050865","volume":"30","author":"B. Xu","year":"2005","unstructured":"Xu, B., Qian, J., Zhang, X., Wu, Z., Chen, L.: A brief survey of program slicing. SIGSOFT Softw. Eng. Notes\u00a030(2), 1\u201336 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification, and Validation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16558-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:02:26Z","timestamp":1559768546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16558-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642165573","9783642165580"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16558-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}