{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:56:32Z","timestamp":1774680992560,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2003.1238037","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"108-117","source":"Crossref","is-referenced-by-count":14,"title":["Design and implementation of bytecode-based Java slicing system"],"prefix":"10.1109","author":[{"given":"F.","family":"Umemori","sequence":"first","affiliation":[]},{"given":"K.","family":"Konda","sequence":"additional","affiliation":[]},{"given":"R.","family":"Yokomori","sequence":"additional","affiliation":[]},{"given":"K.","family":"Inoue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"ref11","first-page":"185","article-title":"A liner time algorithm for finding dominator in flow graphs and related problems","author":"harel","year":"1985","journal-title":"Proc 17th ACM Symp Theory of Comput"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370050303"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014823126938"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493444"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/357062.357071"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2001.991488"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808263"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263703"},{"key":"ref19","article-title":"Points-to analysis in almost linear time","author":"steensgaard","year":"1995","journal-title":"Technical Report MSR-TR-95&#x2013;22"},{"key":"ref4","article-title":"Modern Compiler Implementation in C","author":"appel","year":"1998"},{"key":"ref3","article-title":"Compilers Principles, Techniques, and Tools","author":"aho","year":"1986"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493398"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.1999.809621"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/201055.201056"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1145\/93548.93576","article-title":"Dynamic Program Slicing","volume":"25","author":"agrawal","year":"1990","journal-title":"SIGPlan Notices"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/52.88940"},{"key":"ref9","first-page":"242","article-title":"Contextsen-sitive interprocedural points-to analysis in the presence of function pointers","author":"enami","year":"1994","journal-title":"Proceedings of the ACM Conference on Programming Language Design and Implementation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2002.1021338"},{"key":"ref22","first-page":"11","article-title":"Dynamic Slicing of Object-Oriented Pro-grams","author":"zhao","year":"1998","journal-title":"Technical Report SE-98&#x2013;119 Information Processing Society of Japan (IPSJ)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"}],"event":{"name":"Third IEEE International Workshop on Source Code Analysis and Manipulation.","location":"Amsterdam, Netherlands","acronym":"SCAM-03"},"container-title":["Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8773\/27776\/01238037.pdf?arnumber=1238037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:05:27Z","timestamp":1497585927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/scam.2003.1238037","relation":{},"subject":[]}}