{ "labelLang" : "hun", "responseDate" : "2024-03-28 23:52", "content" : { "otype" : "BookChapter", "mtid" : 27240846, "status" : "APPROVED", "published" : true, "comment" : "A4 IEEE Reliability Society", "unhandledTickets" : 0, "oldTimestamp" : "2018-04-05T06:18:16.000+0000", "deleted" : false, "oldId" : 17240846, "lastRefresh" : "2023-09-14T08:50:58.380+0000", "lastModified" : "2018-04-05T06:18:16.000+0000", "created" : "2018-04-05T06:17:00.000+0000", "creator" : { "otype" : "Author", "mtid" : 10010796, "link" : "/api/author/10010796", "label" : "Gyimóthy Tibor (Számítástudomány)", "familyName" : "Gyimóthy", "givenName" : "Tibor", "published" : true, "oldId" : 10010796, "snippet" : true }, "duplumSearchResult" : { "id" : 2837369, "creationDate" : "2019-12-26T02:40:59.142+0000", "startDate" : "2023-09-14T10:14:30.465+0000", "creator" : { "otype" : "Admin", "mtid" : 565, "link" : "/api/admin/565", "label" : "WoS import (admin)", "familyName" : "WoS", "givenName" : "import", "published" : true, "snippet" : true } }, "duplumRole" : "DUPLUM", "lastDuplumSearch" : "2023-09-14T10:14:30.465+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000312, "link" : "/api/subtype/10000312", "label" : "Konferenciaközlemény (Könyvrészlet)", "name" : "Konferenciaközlemény", "nameEng" : "Conference paper", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 228, "published" : true, "oldId" : 10000312, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Cai, H", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 76336318, "link" : "/api/authorship/76336318", "label" : "Cai, H", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "familyName" : "Cai", "givenName" : "H", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 156425629, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 76336319, "link" : "/api/authorship/76336319", "label" : "Santelices, R", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : true, "familyName" : "Santelices", "givenName" : "R", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 156425628, "snippet" : true } ], "title" : "Abstracting Program Dependencies Using the Method Dependence Graph", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 13708759, "link" : "/api/publicationidentifier/13708759", "label" : "DOI: 10.1109/QRS.2015.18", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "10.1109/QRS.2015.18", "realUrl" : "https://doi.org/10.1109/QRS.2015.18", "published" : false, "oldId" : 16801167, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 23900016, "link" : "/api/publicationidentifier/23900016", "label" : "WoS: 000380466800007", "source" : { "otype" : "PlainSource", "mtid" : 1, "link" : "/api/publicationsource/1", "label" : "WoS", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "WoS", "nameEng" : "WoS", "linkPattern" : "https://www.webofscience.com/wos/woscc/full-record/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 1, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "000380466800007", "realUrl" : "https://www.webofscience.com/wos/woscc/full-record/000380466800007", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 13708758, "link" : "/api/publicationidentifier/13708758", "label" : "Scopus: 84962053259", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "84962053259", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84962053259", "published" : false, "oldId" : 16801166, "snippet" : true } ], "firstPage" : "49", "lastPage" : "58", "internalId" : "7272914", "firstPageOrInternalIdForSort" : "49, 7272914", "pageLength" : 10, "publishedYear" : 2015, "digital" : null, "printed" : null, "sourceYear" : 2018, "packet" : "583278", "foreignEdition" : null, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : true, "nationalOrigin" : null, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2023-09-14", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "referenceList" : "Podgurski, A., Clarke, L., A formal model of program dependences and its implications for software testing, debugging, and maintenance (1990) IEEE Transactions on Software Engineering, 16 (9), pp. 965-979; \n\nHorwitz, S., Reps, T., Binkley, D., Interprocedural slicing using dependence graphs (1990) ACM Transactions on Programming Languages and Systems, 12 (1), pp. 26-60; \n\nJász, J., Beszédes, A., Gyimóthy, T., Rajlich, V., Static execute after before as a replacement of traditional software dependencies (2008) Proceedings of IEEE International Conference on Software Maintenance, pp. 137-146; \n\nAcharya, M., Robinson, B., Practical change impact analysis based on static program slicing for industrial software systems (2011) Proceedings of IEEE/ACM International Conference on Software Engineering, Software Engineering in Practice Track, pp. 746-765. , May; \n\nBohner, S.A., Arnold, R.S., An introduction to software change impact analysis (1996) Software Change Impact Analysis IEEE Comp. Soc. Press, pp. 1-26. , Jun; \n\nJász, J., Static execute after algorithms as alternatives for impact analysis (2010) Electrical Engineering, 52 (3-4), pp. 163-176; \n\nCai, H., Santelices, R., Diver: Precise dynamic impact analysis using dependence-based trace pruning (2014) Proceedings of International Conference on Automated Software Engineering, pp. 343-348; \n\nCai, H., Santelices, R., A framework for cost-effective dependence-based dynamic impact analysis (2015) Proceedings of IEEE International Conference on Software Analysis, Evolution, and Reengineering, pp. 231-240; \n\nCallahan, D., The program summary graph and flow-sensitive interprocedual data flow analysis (1988) Proceedings of ACM Conference on Programming Language Design and Implementation, pp. 47-56; \n\nBreech, B., Tegtmeyer, M., Pollock, L., Integrating influence mechanisms into impact analysis for increased precision (2006) Proceedings of IEEE International Conference on Software Maintenance, pp. 55-65; \n\nYu, Z., Rajlich, V., Hidden dependencies in program comprehension and change propagation (2001) Proceedings of International Workshop on Program Comprehension, pp. 293-299; \n\nTóth, G., Hegedus, P., Beszédes, A., Gyimóthy, T., Jász, J., Comparison of different impact analysis methods and programmer's opinion: An empirical study (2010) Proceedings of International Conference on the Principles and Practice of Programming in Java, pp. 109-118; \n\nSchrettner, L., Jász, J., Gergely, T., Beszédes, A., Gyimóthy, T., Impact analysis in the presence of dependence clusters using static execute after in webkit (2014) Journal of Software: Evolution and Process, 26 (6), pp. 569-588; \n\nBeszédes, A., Gergely, T., Jász, J., Tóth, G., Gyimóthy, T., Rajlich, V., Computation of static execute after relation with applications to software maintenance (2007) Proceedings of IEEE International Conference on Software Maintenance, pp. 295-304; \n\nJász, J., Schrettner, L., Beszédes, A., Osztrogonác, C., Gyimóthy, T., Impact analysis using static execute after in webkit (2012) Proceedings of European Conference on Software Maintainance and Reengineering, pp. 95-104; \n\nSinha, S., Harrold, M.J., Analysis and testing of programs with exception handling constructs (2000) IEEE Transactions on Software Engineering, 26 (9), pp. 849-871; \n\nLi, B., Sun, X., Leung, H., Zhang, S., A survey of code-based change impact analysis techniques (2013) Software Testing, Verification and Reliability, 23, pp. 613-646; \n\nRajlich, V., Software evolution and maintenance (2014) Proceedings of the Conference on the Future of Software Engineering, pp. 133-144; \n\nApiwattanapong, T., Orso, A., Harrold, M.J., Efficient and precise dynamic impact analysis using execute-after sequences (2005) Proceedings of IEEE/ACM International Conference on Software Engineering, pp. 432-441. , May; \n\nCai, H., Jiang, S., Santelices, R., Jie Zhang, Y., Zhang, Y., SENSA: Sensitivity analysis for quantitative change-impact prediction (2014) Proceedings of IEEE Working Conference on Source Code Analysis and Manipulation, pp. 165-174; \n\nCai, H., Santelices, R., A comprehensive study of the predictive accuracy of dynamic change-impact analysis (2015) Journal of Systems and Software, 103, pp. 248-265; \n\nCai, H., Santelices, R., Xu, T., Estimating the accuracy of dynamic change-impact analysis using sensitivity analysis (2014) Proceedings of International Conference on Software Security and Reliability, pp. 48-57; \n\nLoyall, J.P., Mathisen, S.A., Using dependence analysis to support the software maintenance process (1993) Proceedings of IEEE International Conference on Software Maintenance, pp. 282-291; \n\nFerrante, J., Ottenstein, K., Warren, J., The program dependence graph and its use in optimization (1987) ACM Transactions on Programming Languages and Systems, 9 (3), pp. 319-349; \n\nSinha, S., Harrold, M.J., Rothermel, G., Interprocedural control dependence (2001) ACM Transactions on Software Engineering and Methodology, 10 (2), pp. 209-254; \n\nSantelices, R., Zhang, Y., Cai, H., Jiang, S., DUA-Forensics: A finegrained dependence analysis and instrumentation framework based on soot (2013) Proceeding of ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, pp. 13-18. , Jun; \n\nLam, P., Bodden, E., Lhoták, O., Hendren, L., Soot - A Java bytecode optimization framework (2011) Cetus Users and Compiler Infrastructure Workshop, , Oct; \n\nCai, H., Santelices, R., TracerJD: Generic trace-based dynamic dependence analysis with fine-grained logging (2015) Proceedings of IEEE International Conference on Software Analysis, Evolution, and Reengineering, pp. 489-493; \n\nDo, H., Elbaum, S., Rothermel, G., Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact (2005) Empirical Software Engineering, 10 (4), pp. 405-435; \n\nWalpole, R.E., Myers, R.H., Myers, S.L., Ye, K.E., (2011) Probability and Statistics for Engineers and Scientists, , Prentice Hall, Jan; \n\nMosteller, F., Fisher, R.A., Questions and answers (1948) The American Statistician, 2 (5), pp. 30-31; \n\nSun, X., Li, B., Zhang, S., Tao, C., Chen, X., Wen, W., Using lattice of class and method dependence for change impact analysis of object oriented programs (2011) Proceedings of ACM Symposium on Applied Computing, pp. 1439-1444; \n\nEmami, M., (1993) A Practical Interprocedural Alias Analysis for An Optimizing/parallelizing C Compiler, , Master's thesis, McGill University; \n\nMyers, E.M., A precise inter-procedural data flow algorithm (1981) Proceedings of ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 219-230; \n\nNg, J.-C., (2004) Context-sensitive Control Flow Graph, , Master's thesis, Iowa State University; \n\nRamanathan, M.K., Grama, A., Jagannathan, S., Sieve: A tool for automatically detecting variations across program versions (2006) Proceedings of IEEE/ACM International Conference on Automated Software Engineering, pp. 241-252; \n\nRen, X., Shah, F., Tip, F., Ryder, B.G., Chesley, O., Chianti: A tool for change impact analysis of Java programs (2004) Proceedings of ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications, pp. 432-448. , Oct; \n\nRungta, N., Person, S., Branchaud, J., A change impact analysis to characterize evolving program behaviors (2012) Proceedings of IEEE International Conference on Software Maintenance, pp. 109-118", "hasCitationDuplums" : false, "userChangeableUntil" : "2019-01-31T22:59:00.000+0000", "publishDate" : "2018-04-05T06:18:16.000+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 4, "ownerInstituteCount" : 14, "directInstituteCount" : 0, "authorCount" : 2, "contributorCount" : 0, "book" : { "otype" : "Book", "mtid" : 30290369, "link" : "/api/publication/30290369", "label" : "IEEE International Conference on Software Quality, Reliability and Security, QRS 2015. (2015) ISBN:9781467379892", "core" : false, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "IEEE International Conference on Software Quality, Reliability and Security, QRS 2015", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 13705474, "link" : "/api/publicationidentifier/13705474", "label" : "ISBN: 9781467379892", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9781467379892", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9781467379892", "published" : false, "snippet" : true } ], "publishedAt" : [ ], "publishedYear" : 2015, "foreignLanguage" : true, "conferencePublication" : true, "published" : true, "snippet" : true }, "hasQualityFactor" : false, "link" : "/api/publication/27240846", "label" : "Cai H et al. Abstracting Program Dependencies Using the Method Dependence Graph. (2015) Megjelent: IEEE International Conference on Software Quality, Reliability and Security, QRS 2015 pp. 49-58", "template" : "