{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:25Z","timestamp":1772163925491,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,13]],"date-time":"2005-11-13T00:00:00Z","timestamp":1131840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,13]]},"DOI":"10.1145\/1103846.1103849","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T10:52:40Z","timestamp":1139223160000},"page":"17-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing the SPARK program slicer"],"prefix":"10.1145","author":[{"given":"Ricky E.","family":"Sward","sequence":"first","affiliation":[{"name":"U.S. Air Force Academy, CO"}]},{"suffix":"III","given":"Leemon C.","family":"Baird","sequence":"additional","affiliation":[{"name":"U.S. Air Force Academy, CO"}]}],"member":"320","published-online":{"date-parts":[[2005,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"from www.acm.org\/sigada\/wg\/asiswg \/basics.html","author":"Basic Concepts","year":"1998","unstructured":"ASIS Basic Concepts . Retrieved June 3, 2003 , from www.acm.org\/sigada\/wg\/asiswg \/basics.html , 1998 . ASIS Basic Concepts. Retrieved June 3, 2003, from www.acm.org\/sigada\/wg\/asiswg \/basics.html, 1998."},{"key":"e_1_3_2_1_2_1","volume-title":"The SPARK Approach to Safety and Security. c2003 Praxis Critical Systems","author":"Barnes J.","unstructured":"Barnes , J. High Integrity Software , The SPARK Approach to Safety and Security. c2003 Praxis Critical Systems , Addison-Wesley , London, England . Barnes, J. High Integrity Software, The SPARK Approach to Safety and Security. c2003 Praxis Critical Systems, Addison-Wesley, London, England."},{"key":"e_1_3_2_1_4_1","unstructured":"Program Slicing. Retrieved June 4 2003 from www.ssw.unilinz.ac.at\/Research\/Projects\/ ProgramSlicing.  Program Slicing. Retrieved June 4 2003 from www.ssw.unilinz.ac.at\/Research\/Projects\/ ProgramSlicing."},{"key":"e_1_3_2_1_5_1","volume-title":"Oct","author":"The SPADE","year":"2003","unstructured":"SPARK 95 - The SPADE Ada 95 Kernel , copyright Praxis Critical Systems. Edition 4.1 , Oct 2003 . SPARK 95 - The SPADE Ada 95 Kernel, copyright Praxis Critical Systems. Edition 4.1, Oct 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/958420.958423"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1032297.1032303"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/786767.786820"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11499909_9"},{"key":"e_1_3_2_1_11_1","volume-title":"from http:\/\/hissa.nist.gov\/unravel\/","author":"The Unravel Project","year":"1998","unstructured":"The Unravel Project . Retrieved June 4, 2003 , from http:\/\/hissa.nist.gov\/unravel\/ , 1998 . The Unravel Project. Retrieved June 4, 2003, from http:\/\/hissa.nist.gov\/unravel\/, 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_3_2_1_13_1","volume-title":"from www.cs.wisc.edu\/wpis\/slicing_tool\/","author":"The Wisconsin Program-Slicing","year":"2000","unstructured":"The Wisconsin Program-Slicing Tool, Version 1.1. Retrieved June 4, 2003 , from www.cs.wisc.edu\/wpis\/slicing_tool\/ , 2000 . The Wisconsin Program-Slicing Tool, Version 1.1. Retrieved June 4, 2003, from www.cs.wisc.edu\/wpis\/slicing_tool\/, 2000."}],"event":{"name":"SIGAda '05: ACM SIGAda Annual International Conference","location":"Atlanta GA USA","acronym":"SIGAda '05","sponsor":["ACM Association for Computing Machinery","SIGAda ACM Special Interest Group on Ada Programming Language","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","SIGCAS ACM Special Interest Group on Computers and Society","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2005 annual ACM SIGAda international conference on Ada: The Engineering of Correct and Reliable Software for Real-Time &amp; Distributed Systems using Ada and Related Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103846.1103849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103846.1103849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:48:54Z","timestamp":1750272534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103846.1103849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,13]]},"references-count":11,"alternative-id":["10.1145\/1103846.1103849","10.1145\/1103846"],"URL":"https:\/\/doi.org\/10.1145\/1103846.1103849","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1104011.1103849","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,11,13]]},"assertion":[{"value":"2005-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}