{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:41Z","timestamp":1750306241451,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,14]],"date-time":"2017-01-14T00:00:00Z","timestamp":1484352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,14]]},"DOI":"10.1145\/3034950.3035005","type":"proceedings-article","created":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:24:09Z","timestamp":1490286249000},"page":"71-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Study on Simplified Dynamic Slicing Algorithm based on Input Classification"],"prefix":"10.1145","author":[{"given":"Zhaoxiang","family":"Yi","sequence":"first","affiliation":[{"name":"Xi'an Research Institute of Hi-Tech, Hongqing Town Xi'an, Shanxi, China"}]},{"given":"Xiongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi'an Research Institute of Hi-Tech, Hongqing Town Xi'an, Shanxi, China"}]},{"given":"Yongjiu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Equipment Academy of the Second Artillery Force, Qinghe Beijing, China"}]},{"given":"Yue","family":"Ren","sequence":"additional","affiliation":[{"name":"Equipment Academy of the Second Artillery Force, Qinghe Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2017,1,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cao Y. 2013. Research on Software Vulnerability Analysis Oriented Parallel Symbolic Execution. Doctoral Thesis. PLA Information Engineering University.  Cao Y. 2013. Research on Software Vulnerability Analysis Oriented Parallel Symbolic Execution. Doctoral Thesis. PLA Information Engineering University."},{"key":"e_1_3_2_1_2_1","unstructured":"Xu Y.X. 2016. Space Launch Report of Q1 2016. Space International.3 (Jun. 2016) 79--82.  Xu Y.X. 2016. Space Launch Report of Q1 2016. Space International.3 (Jun. 2016) 79--82."},{"key":"e_1_3_2_1_3_1","unstructured":"Weiser M. 1979. Program slicing: formal psychological and practical investigations of an automatic program abstraction method. Doctoral Thesis. University of Michigan.   Weiser M. 1979. Program slicing: formal psychological and practical investigations of an automatic program abstraction method. Doctoral Thesis. University of Michigan."},{"volume-title":"Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering(Chicago, Illinois, USA, November 08-11,1995). ISSRE'05. IEEE Computer Society, Washington DC, 143--151","author":"Agrawal H.","key":"e_1_3_2_1_4_1"},{"volume-title":"Proceedings of the 7th European Software Engineering Conference and 7th ACM SIGSOFT International Symposium on Foundations of Software Engineering","year":"1999","author":"Gyimothy T.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085135"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Russell J. T. and Jacome M. F. 2009. Program slicing across the hardware-software boundary for embedded systems. Int. J. Embedded Syst. 4(Jan.2009) 66--82.  Russell J. T. and Jacome M. F. 2009. Program slicing across the hardware-software boundary for embedded systems. Int. J. Embedded Syst. 4(Jan.2009) 66--82.","DOI":"10.1504\/IJES.2009.027241"},{"volume-title":"Proceedings of 4th International Conference on Machine Vision: Computer Vision and Image Analysis; Pattern Recognition and Basic Technologies","year":"2011","author":"Huang S.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.29"}],"event":{"name":"ICMSS '17: 2017 International Conference on Management Engineering, Software Engineering and Service Sciences","sponsor":["Wuhan Univ. Wuhan University, China"],"location":"Wuhan China","acronym":"ICMSS '17"},"container-title":["Proceedings of the 2017 International Conference on Management Engineering, Software Engineering and Service Sciences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034950.3035005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3034950.3035005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:33Z","timestamp":1750220613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034950.3035005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,14]]},"references-count":9,"alternative-id":["10.1145\/3034950.3035005","10.1145\/3034950"],"URL":"https:\/\/doi.org\/10.1145\/3034950.3035005","relation":{},"subject":[],"published":{"date-parts":[[2017,1,14]]},"assertion":[{"value":"2017-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}