{"doi":"10.1016/j.tcs.2005.06.020","_id":"3228","user_id":"29719","date_created":"2018-06-14T06:40:02Z","year":"2005","type":"journal_article","page":"509--528","date_updated":"2022-01-06T06:59:06Z","issue":"3","publication":"Theor. Comput. Sci.","department":[{"_id":"77"}],"author":[{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"title":"Slicing techniques for verification re-use","citation":{"mla":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3, 2005, pp. 509--528, doi:10.1016/j.tcs.2005.06.020.","short":"H. Wehrheim, Theor. Comput. Sci. (2005) 509--528.","apa":"Wehrheim, H. (2005). Slicing techniques for verification re-use. Theor. Comput. Sci., (3), 509--528. https://doi.org/10.1016/j.tcs.2005.06.020","bibtex":"@article{Wehrheim_2005, title={Slicing techniques for verification re-use}, DOI={10.1016/j.tcs.2005.06.020}, number={3}, journal={Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2005}, pages={509--528} }","ama":"Wehrheim H. Slicing techniques for verification re-use. Theor Comput Sci. 2005;(3):509--528. doi:10.1016/j.tcs.2005.06.020","ieee":"H. Wehrheim, “Slicing techniques for verification re-use,” Theor. Comput. Sci., no. 3, pp. 509--528, 2005.","chicago":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3 (2005): 509--528. https://doi.org/10.1016/j.tcs.2005.06.020."},"status":"public"}