{"date_created":"2018-06-14T06:40:02Z","status":"public","page":"509--528","user_id":"29719","department":[{"_id":"77"}],"title":"Slicing techniques for verification re-use","publication":"Theor. Comput. Sci.","date_updated":"2022-01-06T06:59:06Z","type":"journal_article","_id":"3228","doi":"10.1016/j.tcs.2005.06.020","author":[{"id":"573","first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike"}],"year":"2005","citation":{"short":"H. Wehrheim, Theor. Comput. Sci. (2005) 509--528.","ieee":"H. Wehrheim, “Slicing techniques for verification re-use,” Theor. Comput. Sci., no. 3, pp. 509--528, 2005.","chicago":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3 (2005): 509--528. https://doi.org/10.1016/j.tcs.2005.06.020.","ama":"Wehrheim H. Slicing techniques for verification re-use. Theor Comput Sci. 2005;(3):509--528. doi:10.1016/j.tcs.2005.06.020","mla":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3, 2005, pp. 509--528, doi:10.1016/j.tcs.2005.06.020.","bibtex":"@article{Wehrheim_2005, title={Slicing techniques for verification re-use}, DOI={10.1016/j.tcs.2005.06.020}, number={3}, journal={Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2005}, pages={509--528} }","apa":"Wehrheim, H. (2005). Slicing techniques for verification re-use. Theor. Comput. Sci., (3), 509--528. https://doi.org/10.1016/j.tcs.2005.06.020"},"issue":"3"}