{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:25:32Z","timestamp":1729610732869,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csmr.2003.1192443","type":"proceedings-article","created":{"date-parts":[[2003,12,8]],"date-time":"2003-12-08T19:31:53Z","timestamp":1070911913000},"page":"351-360","source":"Crossref","is-referenced-by-count":1,"title":["Fast flow analysis to compute fuzzy estimates of risk levels"],"prefix":"10.1109","author":[{"given":"E.","family":"Merlo","sequence":"first","affiliation":[]},{"given":"G.","family":"Antoniol","sequence":"additional","affiliation":[]},{"given":"P.-L.","family":"Brunelle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"Journal of Programming Languages"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253371"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302675"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919091"},{"key":"13","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1016\/S0950-5849(98)00093-7","article-title":"Program analysis via graph reachability","volume":"40","author":"reps","year":"1998","journal-title":"Information and Software Technology"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367022"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194095000022"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03811-6"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/267959.269970"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972711"},{"journal-title":"Compilers Principles Techniques Tools","year":"1986","author":"aho","key":"1"},{"key":"10","first-page":"62","article-title":"Context sensitive flow analysis to detect blocked statements","author":"malenfant","year":"2001","journal-title":"Proceedings of International Conference on Software Maintenance"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/321921.321938"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891463"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-47764-0_3","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"2001","journal-title":"Proceedings of the 8th Static Analysis Symposium"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/512927.512945"}],"event":{"name":"Seventh European Conference on Software Maintenance and Reengineering","acronym":"CSMT-03","location":"Benevento, Italy"},"container-title":["Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8481\/26736\/01192443.pdf?arnumber=1192443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T02:45:25Z","timestamp":1497581125000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csmr.2003.1192443","relation":{},"subject":[]}}