{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T19:44:03Z","timestamp":1748720643593,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsm.2002.1167744","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T01:03:42Z","timestamp":1056589422000},"page":"22-31","source":"Crossref","is-referenced-by-count":26,"title":["Evaluating context-sensitive slicing and chopping"],"prefix":"10.1109","author":[{"given":"J.","family":"Krinke","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/S0950-5849(98)00090-1","article-title":"Validation of measurement software as an application of slicing and constraint solving","volume":"40","author":"krinke","year":"1998","journal-title":"Information and Software Technology"},{"key":"ref11","article-title":"Efficient points-to analysis for whole-program analysis","author":"liang","year":"0","journal-title":"In ESEC \/ SIGSOFT FSE 1999"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2001.921712"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808263"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/222124.222138"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/193173.195287"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/581396.581398"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/383043.381532","article-title":"A schema for interprocedural modification side-effect analysis with pointer aliasing","author":"ryder","year":"2001","journal-title":"ACM Trans Prog Lang Syst"},{"key":"ref18","article-title":"Two approaches to interprocedural data flow analysis","author":"sharir","year":"1981","journal-title":"Program Flow Analysis Theory and Applications"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"article-title":"Report CS2000-0643","year":"2000","author":"bent","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972711"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0025882","article-title":"Flow-insensitive interprocedural alias analysis in the presence of pointers","author":"burke","year":"1995"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/193173.195281"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493398"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379630"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/277631.277638"}],"event":{"name":"International Conference on Software Maintenance","acronym":"ICSM-02","location":"Montreal, Que., Canada"},"container-title":["International Conference on Software Maintenance, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8357\/26332\/01167744.pdf?arnumber=1167744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T08:43:20Z","timestamp":1623141800000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1167744\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icsm.2002.1167744","relation":{},"subject":[]}}