{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:45:21Z","timestamp":1760586321924,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsm.2003.1235404","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"34-43","source":"Crossref","is-referenced-by-count":53,"title":["Slicing of state-based models"],"prefix":"10.1109","author":[{"given":"B.","family":"Korel","sequence":"first","affiliation":[]},{"given":"I.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"L.","family":"Tahat","sequence":"additional","affiliation":[]},{"given":"B.","family":"Vaysburg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Design and Validation of Protocols","year":"1990","author":"holzman","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/267896.267926"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.1998.711837"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/CMPEUR.1992.218505"},{"key":"15","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-46428-X_3","article-title":"From Play-In Scenarios to Code: An Achievable Dream","volume":"1783","author":"harel","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"34","first-page":"8798","article-title":"Applying Slicing Technique to Software Architecture","author":"zhao","year":"1998","journal-title":"Proceedings of the 4th IEEE International Conference on Engineering of Complex Computer Systems ICECCS'98"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1992.242531"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/566189.566192"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/32.581327"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167768"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/12.88471"},{"key":"25","first-page":"187","article-title":"Experiments on Slicing-based Debugging Tools","author":"lyle","year":"1986","journal-title":"Proceedings of the 1st Conference on Empirical Studies of Programming"},{"key":"26","article-title":"Specification Slicing in Formal Methods of Software Engineering","author":"oda","year":"1993","journal-title":"Proceedings of the 7th International Computer Software and Applications Conference"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.1997.577516"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/AUTEST.1996.547691"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2001.960658"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(87)90084-5"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00203-6"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00063-8"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/6.632499"},{"key":"30","first-page":"130","article-title":"Automating Test Case Generation from SDL Specifications","author":"vaysburg","year":"2001","journal-title":"Proceedings of the 18th International Conference on Testing Computer Software (TCS)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302640"},{"key":"6","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/157485.164585","article-title":"automatic functional test generation using the extended finite state machine model","author":"cheng","year":"1993","journal-title":"30th ACM\/IEEE Design Automation Conference"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"5","article-title":"Static and Dynamic Specification Slicing","author":"chang","year":"1994","journal-title":"Proceedings of the Fourth Irvine Software Symposium"},{"key":"31","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/566172.566188","article-title":"Dependence Analysis in Reduction of Requirement Based Test Suites","author":"vaysburg","year":"2002","journal-title":"Proceedings of the ACM International Symposium on Software Testing and Analysis (ISSTA)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/32.689403"},{"journal-title":"UML Statecharts","year":"1999","author":"douglass","key":"9"},{"key":"8","first-page":"268","article-title":"Automating the Generation and Sequencing of Test Case from Model-Based Specification","author":"dick","year":"1992","journal-title":"Proceedings of the Industrial Strength Formal Methods 5th International Symposium on Formal Methods"}],"event":{"name":"International Conference on Software Maintenance","acronym":"ICSM-03","location":"Amsterdam, Netherlands"},"container-title":["International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8742\/27696\/01235404.pdf?arnumber=1235404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:05:23Z","timestamp":1497571523000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1235404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icsm.2003.1235404","relation":{},"subject":[]}}