{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:42:48Z","timestamp":1769722968258,"version":"3.49.0"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335396","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:49:26Z","timestamp":1448318966000},"page":"1-10","source":"Crossref","is-referenced-by-count":29,"title":["ORBS and the limits of static slicing"],"prefix":"10.1109","author":[{"given":"David","family":"Binkley","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Gold","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Harman","sequence":"additional","affiliation":[]},{"given":"Syed","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Jens","family":"Krinke","sequence":"additional","affiliation":[]},{"given":"Shin","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914974"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226310"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.30"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972726"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/53990.53994"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808263"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90094-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33125-1_17"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1997.601266"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2003.1238034"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/158511.158694"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"ref29","article-title":"Program slicing","author":"weiser","year":"1981","journal-title":"5th Int Conf on Software Engineering"},{"key":"ref2","article-title":"A safe approximate algorithm for interproce-pointer aliasing","author":"landi","year":"1992","journal-title":"SIGPLAN'92 Conf on Programming Language Design and Implementation (PLDI'92) SIGPLAN Notices"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/73560.73573"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61580-6_20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"ref24","article-title":"Montr&#x00E9;al boat example","author":"danicic","year":"2002","journal-title":"Source Code Analysis and Manipulation (SCAM 2002) conference resources website"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2003.1238035"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167743"},{"key":"ref25","article-title":"A survey of software fault localization","author":"wong","year":"2009","journal-title":"Tech Rep Technical Report UTDCS-45&#x2013;09"},{"key":"ref50","article-title":"Heuristically minimizes interesting files","author":"mcpeak","year":"0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.23"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/S0950-5849(98)00085-8","article-title":"The application of program slicing to regression testing","volume":"40","author":"binkley","year":"1998","journal-title":"Information and Software Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.232"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/976270.976283"},{"key":"ref13","article-title":"Program and interface slicing for reverse engineering","author":"beck","year":"1993","journal-title":"Proc Int Conf Softw Eng (ICSE)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1995.526534"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1109\/WPC.1996.501116","article-title":"Understanding function behaviours through program slicing","author":"de lucia","year":"1996","journal-title":"International Workshop on Program Comprehension"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1997.601269"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205178"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635893"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/358557.358577"},{"key":"ref4","article-title":"Deriving a slicing algorithm via FermaT transformations","author":"ward","year":"2010","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/195274.195287"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624245"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014823126938"},{"key":"ref7","article-title":"A demand-driven approach to slicing legacy COBOL systems","volume":"24","author":"hajnal","year":"2011","journal-title":"Journal of Software Evolution and Process"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"ref9","article-title":"Experiments on slicing-based debugging aids","author":"weiser","year":"1985","journal-title":"Empirical Studies of Programmers First Workshop"},{"key":"ref46","article-title":"Yesterday, my program worked. today, it does not. Why?","author":"zeller","year":"1999","journal-title":"Euro Softw Eng Conf and Symp on the Found of Softw Eng"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2010.0141"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref47","article-title":"Finding failure causes through automated testing","author":"cleve","year":"2000","journal-title":"Workshop on Automated Debugging"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2005.8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.07.024"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9007-3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996855"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","location":"Bremen, Germany","start":{"date-parts":[[2015,9,27]]},"end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335396.pdf?arnumber=7335396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T20:53:22Z","timestamp":1567371202000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335396","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}