{"user_id":"29719","citation":{"bibtex":"@article{Wehrheim_2005, title={Slicing techniques for verification re-use}, DOI={10.1016/j.tcs.2005.06.020}, number={3}, journal={Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2005}, pages={509--528} }","short":"H. Wehrheim, Theor. Comput. Sci. (2005) 509--528.","mla":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3, 2005, pp. 509--528, doi:10.1016/j.tcs.2005.06.020.","ama":"Wehrheim H. Slicing techniques for verification re-use. Theor Comput Sci. 2005;(3):509--528. doi:10.1016/j.tcs.2005.06.020","ieee":"H. Wehrheim, “Slicing techniques for verification re-use,” Theor. Comput. Sci., no. 3, pp. 509--528, 2005.","chicago":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3 (2005): 509--528. https://doi.org/10.1016/j.tcs.2005.06.020.","apa":"Wehrheim, H. (2005). Slicing techniques for verification re-use. Theor. Comput. Sci., (3), 509--528. https://doi.org/10.1016/j.tcs.2005.06.020"},"date_updated":"2022-01-06T06:59:06Z","title":"Slicing techniques for verification re-use","year":"2005","department":[{"_id":"77"}],"issue":"3","publication":"Theor. Comput. Sci.","doi":"10.1016/j.tcs.2005.06.020","type":"journal_article","page":"509--528","author":[{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"_id":"3228","status":"public","date_created":"2018-06-14T06:40:02Z"}