{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T09:47:47Z","timestamp":1770889667244,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,1,31]],"date-time":"2017-01-31T00:00:00Z","timestamp":1485820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Logic"],"published-print":{"date-parts":[[2017,1,31]]},"abstract":"<jats:p>\n            In the present article, we formally define the notion of\n            <jats:italic>abstract program slicing<\/jats:italic>\n            , a general form of program slicing where properties of data are considered instead of their exact value. This approach is applied to a language with numeric and reference values and relies on the notion of\n            <jats:italic>abstract dependencies<\/jats:italic>\n            between program statements.\n          <\/jats:p>\n          <jats:p>\n            The different forms of (backward) abstract slicing are added to an existing formal framework where traditional, nonabstract forms of slicing could be compared. The extended framework allows us to appreciate that abstract slicing is a generalization of traditional slicing, since each form of traditional slicing (dealing with syntactic dependencies) is generalized by a semantic (nonabstract) form of slicing, which is actually equivalent to an abstract form where the\n            <jats:italic>identity<\/jats:italic>\n            abstraction is performed on data.\n          <\/jats:p>\n          <jats:p>\n            Sound algorithms for computing abstract dependencies and a systematic characterization of program slices are provided, which rely on the notion of\n            <jats:italic>agreement<\/jats:italic>\n            between program states.\n          <\/jats:p>","DOI":"10.1145\/3029052","type":"journal-article","created":{"date-parts":[[2017,2,27]],"date-time":"2017-02-27T13:06:52Z","timestamp":1488200812000},"page":"1-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Abstract Program Slicing"],"prefix":"10.1145","volume":"18","author":[{"given":"Isabella","family":"Mastroeni","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Verona, Italy"}]},{"given":"Damiano","family":"Zanardini","sequence":"additional","affiliation":[{"name":"Technical University of Madrid (UPM), Spain"}]}],"member":"320","published-online":{"date-parts":[[2017,2,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.03.002"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2010.18"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050150"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.04.007"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.01.012"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60641-5"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(98)00086-X"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199605)8:3%3C145::AID-SMR127%3E3.3.CO;2-0"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/647348.724445"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/567752.567778"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.08.033"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2001.972675"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/77545"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199534"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.12.018"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103746.2103761"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964017"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30124-0_23"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/333979.333989"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of International Conference on Software Paradigm Trends (ICSOFT\u201912)","author":"Halder R.","unstructured":"R. Halder and A. Cortesi . 2012. Tukra: An abstract program slicing tool . In Proceedings of International Conference on Software Paradigm Trends (ICSOFT\u201912) . 178--183. R. Halder and A. Cortesi. 2012. Tukra: An abstract program slicing tool. In Proceedings of International Conference on Software Paradigm Trends (ICSOFT\u201912). 178--183."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.05.007"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379665"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/65979.65980"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_13"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314276.1314290"},{"key":"e_1_2_1_31_1","unstructured":"I. Mastroeni. 2013. Abstract interpretation-based approaches to security - A survey on abstract non-interference and its challenging applications. In Semantics Abstract Interpretation and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday. 41--65.  I. Mastroeni. 2013. Abstract interpretation-based approaches to security - A survey on abstract non-interference and its challenging applications. In Semantics Abstract Interpretation and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday. 41--65."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of International Conference on Formal Engineering Methods (ICFEM\u201910)","volume":"6447","author":"Mastroeni I.","unstructured":"I. Mastroeni and D. Nikoli\u0107 . 2010. Abstract program slicing: From theory towards an implementation . In Proceedings of International Conference on Formal Engineering Methods (ICFEM\u201910) (Lecture Notes in Computer Science) , Vol. 6447 . Springer-Verlag, 452--467. I. Mastroeni and D. Nikoli\u0107. 2010. Abstract program slicing: From theory towards an implementation. In Proceedings of International Conference on Formal Engineering Methods (ICFEM\u201910) (Lecture Notes in Computer Science), Vol. 6447. Springer-Verlag, 452--467."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328408.1328428"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/647171.716104"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(91)90039-Z"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/646625.698195"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11609773_7"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_22"},{"key":"e_1_2_1_39_1","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip F.","year":"1995","unstructured":"F. Tip . 1995 . A survey of program slicing techniques . Journal of Programming Languages 3 (1995), 121 -- 181 . F. Tip. 1995. A survey of program slicing techniques. Journal of Programming Languages 3 (1995), 121--181.","journal-title":"Journal of Programming Languages"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216374.1216375"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of Working Conference on Source Code Analysis and Manipualtion (SCAM\u201908)","author":"Zanardini D.","year":"2008","unstructured":"D. Zanardini . 2008 . The semantics of abstract orogram slicing . In Proceedings of Working Conference on Source Code Analysis and Manipualtion (SCAM\u201908) . D. Zanardini. 2008. The semantics of abstract orogram slicing. In Proceedings of Working Conference on Source Code Analysis and Manipualtion (SCAM\u201908)."},{"key":"e_1_2_1_43_1","volume-title":"Field-sensitive sharing. CoRR abs\/1306.6526","author":"Zanardini D.","year":"2015","unstructured":"D. Zanardini . 2015. Field-sensitive sharing. CoRR abs\/1306.6526 ( 2015 ). http:\/\/arxiv.org\/abs\/1306.6526 D. Zanardini. 2015. Field-sensitive sharing. CoRR abs\/1306.6526 (2015). http:\/\/arxiv.org\/abs\/1306.6526"}],"container-title":["ACM Transactions on Computational Logic"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:15Z","timestamp":1750220595000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029052"}},"subtitle":["An Abstract Interpretation-Based Approach to Program Slicing"],"short-title":[],"issued":{"date-parts":[[2017,1,31]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1,31]]}},"alternative-id":["10.1145\/3029052"],"URL":"https:\/\/doi.org\/10.1145\/3029052","relation":{},"ISSN":["1529-3785","1557-945X"],"issn-type":[{"value":"1529-3785","type":"print"},{"value":"1557-945X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,31]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}