{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:04:43Z","timestamp":1748070283307,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2002.1134113","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T01:03:42Z","timestamp":1056589422000},"page":"133-142","source":"Crossref","is-referenced-by-count":5,"title":["Predicate-based dynamic slicing of message passing programs"],"prefix":"10.1109","author":[{"given":"J.","family":"Rilling","sequence":"first","affiliation":[]},{"given":"H.F.","family":"Li","sequence":"additional","affiliation":[]},{"given":"D.","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"Journal of Program Languages"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/CMPSAC.2001.960601"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ICSE.1996.493444"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/277631.277638"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/226239.226256"},{"key":"ref30","article-title":"Program slicing: An application of object-oriented Program Dependency Graphs","author":"krishnaswamy","year":"1994","journal-title":"Technical report TR94-108 Cs Dep Clemson University"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/SCAM.2001.972662"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/3-540-45414-4_6"},{"key":"ref35","first-page":"187","article-title":"Experiments on slicing-based debugging tools","author":"lyle","year":"1986","journal-title":"Proceedings of the 1st Conference on Empirical Studies of Programming"},{"year":"1994","author":"law","article-title":"Object-Oriented Program Slicing","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICDSC.2001.918962"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/358557.358577"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/32.83912"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICSM.1991.160329"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICSM.1992.242531"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/261640.261644"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/WCRE.2001.957807"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1002\/(SICI)1096-908X(199811\/12)10:6<415::AID-SMR180>3.0.CO;2-Z"},{"key":"ref17","volume":"40","author":"harman","year":"1998","journal-title":"Information and Software Technology (Special Issue on Program Slicing)"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/WPC.1997.601266"},{"key":"ref19","first-page":"1243","article-title":"Experinece with Logical code analysis in software reuse and reengineering","volume":"10","author":"hart","year":"1995","journal-title":"AIAA computing in Aeorspace"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/WPC.1998.693339"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/S0065-2458(08)60641-5"},{"key":"ref27","first-page":"66","article-title":"Forward Derivation of Dynamic Slices","author":"korel","year":"1994","journal-title":"Proceedings of the International Symposium on Software Testing and Analysis"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/178243.178456"},{"key":"ref6","first-page":"232","article-title":"Slicing concurrent programs a graph-approach","volume":"749","author":"cheng","year":"1993","journal-title":"Of Lecture Notes in Computer Science"},{"key":"ref29","article-title":"CASE and Dynamic Program Slicing in Software Maintenance","author":"korel","year":"1998","journal-title":"Special issue of the International Journal of Computer Science and Information Management"},{"key":"ref5","first-page":"395","article-title":"Slicing object oriented Programms","author":"chen","year":"1997","journal-title":"Proceedings of the APSEC'97"},{"key":"ref8","first-page":"329","article-title":"Distributed slicing and partial re-execution for distributed programs","author":"duesterwald","year":"1992","journal-title":"Proceedings of the Fifth Workshop on Languages and Compilers for Parallel Computing"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/115372.115324"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/spe.4380230603"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/71.995818"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/93542.93576"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/INFVIS.1995.528691"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICSE.1992.753516"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/77606.77608"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/CMPSAC.1996.544182","article-title":"Static Slicing of Concurrent Object-Oriented Programs","author":"zhao","year":"1996","journal-title":"Proceedings of the 20th IEEE Annual International Computer Software and Applications Conference"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/0165-6074(93)90203-W"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TSE.1984.5010248"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICSM.1995.526544"},{"key":"ref26","first-page":"199","article-title":"Dynamic slicing of distributed programs","volume":"2","author":"korel","year":"1992","journal-title":"Applied Mathematics & Computer Science Journal"},{"key":"ref43","first-page":"17","article-title":"Dynamic Slicing of Object-Oriented Programs","author":"zhao","year":"1998","journal-title":"Technical-Report SE-98-119"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/0020-0190(88)90054-3"}],"event":{"acronym":"SCAM-02","name":"Second IEEE International Workshop on Source Code Analysis and Manipulation","location":"Montreal, Que., Canada"},"container-title":["Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8211\/25179\/01134113.pdf?arnumber=1134113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:45:10Z","timestamp":1497566710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1134113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/scam.2002.1134113","relation":{},"subject":[]}}