Slicing techniques for verification re-use

H. Wehrheim, Theor. Comput. Sci. (2005) 509--528.

Download
No fulltext has been uploaded.
Journal Article
Publishing Year
Journal Title
Theor. Comput. Sci.
Issue
3
Page
509--528
LibreCat-ID

Cite this

Wehrheim H. Slicing techniques for verification re-use. Theor Comput Sci. 2005;(3):509--528. doi:10.1016/j.tcs.2005.06.020
Wehrheim, H. (2005). Slicing techniques for verification re-use. Theor. Comput. Sci., (3), 509--528. https://doi.org/10.1016/j.tcs.2005.06.020
@article{Wehrheim_2005, title={Slicing techniques for verification re-use}, DOI={10.1016/j.tcs.2005.06.020}, number={3}, journal={Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2005}, pages={509--528} }
Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3 (2005): 509--528. https://doi.org/10.1016/j.tcs.2005.06.020.
H. Wehrheim, “Slicing techniques for verification re-use,” Theor. Comput. Sci., no. 3, pp. 509--528, 2005.
Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3, 2005, pp. 509--528, doi:10.1016/j.tcs.2005.06.020.

Export

Marked Publications

Open Data LibreCat

Search this title in

Google Scholar