{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:13:03Z","timestamp":1759032783847,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030605070"},{"type":"electronic","value":"9783030605087"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60508-7_15","type":"book-chapter","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T04:33:06Z","timestamp":1602045186000},"page":"279-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Test4Enforcers: Test Case Generation for Software Enforcers"],"prefix":"10.1007","author":[{"given":"Michell","family":"Guzman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2120-2894","authenticated-orcid":false,"given":"Oliviero","family":"Riganelli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1261-2234","authenticated-orcid":false,"given":"Daniela","family":"Micucci","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9527-7042","authenticated-orcid":false,"given":"Leonardo","family":"Mariani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"15_CR1","unstructured":"Android Docs: Camera API (2020). https:\/\/developer.android.com\/guide\/topics\/media\/camera"},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11219-014-9242-6","volume":"23","author":"F Belli","year":"2014","unstructured":"Belli, F., Beyaz\u0131t, M., Endo, A.T., Mathur, A., Simao, A.: Fault domain-based testing in imperfect situations: a heuristic approach and case studies. Softw. Qual. J. 23(3), 423\u2013452 (2014). https:\/\/doi.org\/10.1007\/s11219-014-9242-6","journal-title":"Softw. Qual. J."},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10207-011-0137-2","volume":"10","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Do you really mean what you actually enforced? Int. J. Inf. Secur. 10, 239\u2013254 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"3","author":"TS Chow","year":"1978","unstructured":"Chow, T.S.: Testing software design modeled by finite-state machines. IEEE Trans. Softw. Eng. 3, 178\u2013187 (1978)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-10665-1_5","volume-title":"Cloud Computing","author":"Y Dai","year":"2009","unstructured":"Dai, Y., Xiang, Y., Zhang, G.: Self-healing and hybrid diagnosis in cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 45\u201356. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10665-1_5"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-319-23820-3_24","volume-title":"Runtime Verification","author":"P Daian","year":"2015","unstructured":"Daian, P., et al.: RV-Android: efficient parametric android runtime verification, a brief tutorial. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 342\u2013357. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_24"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Dalal, S.R., et al.: Model-based testing in practice. In: Proceedings of the International Conference on Software Engineering (ICSE) (1999)","DOI":"10.1145\/302405.302640"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Dias Neto, A.C., Subramanyan, R., Vieira, M., Travassos, G.H.: A survey on model-based testing approaches: a systematic review. In: Proceedings of the ACM International Workshop on Empirical Assessment of Software Engineering Languages and Technologies (WEASELTech) (2007)","DOI":"10.1145\/1353673.1353681"},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10207-014-0239-8","volume":"14","author":"E Dolzhenko","year":"2014","unstructured":"Dolzhenko, E., Ligatti, J., Reddy, S.: Modeling runtime enforcement with mandatory results automata. Int. J. Inf. Secur. 14(1), 47\u201360 (2014). https:\/\/doi.org\/10.1007\/s10207-014-0239-8","journal-title":"Int. J. Inf. Secur."},{"issue":"12","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1016\/j.infsof.2010.07.001","volume":"52","author":"R Dorofeeva","year":"2010","unstructured":"Dorofeeva, R., El-Fakih, K., Maag, S., Cavalli, A.R., Yevtushenko, N.: FSM-based conformance testing methods: a survey annotated with experimental evaluation. Inf. Softw. Technol. 52(12), 1286\u20131297 (2010)","journal-title":"Inf. Softw. Technol."},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/11562436_16","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2005","author":"R Dorofeeva","year":"2005","unstructured":"Dorofeeva, R., El-Fakih, K., Yevtushenko, N.: An improved conformance testing method. In: Wang, F. (ed.) FORTE 2005. LNCS, vol. 3731, pp. 204\u2013218. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11562436_16"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-35632-2_11","volume-title":"Runtime Verification","author":"Y Falcone","year":"2013","unstructured":"Falcone, Y., Currea, S., Jaber, M.: Runtime verification and enforcement for android applications with RV-Droid. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 88\u201395. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_11"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-030-32079-9_4","volume-title":"Runtime Verification","author":"Y Falcone","year":"2019","unstructured":"Falcone, Y., Pinisetty, S.: On the runtime enforcement of timed properties. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 48\u201369. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_4"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-16612-9_9","volume-title":"Runtime Verification","author":"Y Falcone","year":"2010","unstructured":"Falcone, Y.: You should better enforce than verify. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 89\u2013105. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9_9"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-75632-5_4","volume-title":"Lectures on Runtime Verification","author":"Y Falcone","year":"2018","unstructured":"Falcone, Y., Mariani, L., Rollet, A., Saha, S.: Runtime failure prevention and reaction. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 103\u2013134. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_4"},{"issue":"3","key":"15_CR16","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10703-011-0114-4","volume":"38","author":"Y Falcone","year":"2011","unstructured":"Falcone, Y., Mounier, L., Fernandez, J.C., Richier, J.L.: Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods Syst. Des. 38(3), 223\u2013262 (2011)","journal-title":"Formal Methods Syst. Des."},{"issue":"6","key":"15_CR17","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/32.87284","volume":"17","author":"S Fujiwara","year":"1991","unstructured":"Fujiwara, S., von Bochmann, G., Khendek, F., Amalou, M., Ghedamsi, A.: Test selection based on finite state models. IEEE Trans. Softw. Eng. 17(6), 591\u2013603 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"15_CR18","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/T-C.1970.222975","volume":"C\u201319","author":"G Gonenc","year":"1970","unstructured":"Gonenc, G.: A method for the design of fault detection experiments. IEEE Trans. Comput. C\u201319(6), 551\u2013558 (1970)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1007\/s11219-017-9386-2","volume":"26","author":"HG Gurbuz","year":"2017","unstructured":"Gurbuz, H.G., Tekinerdogan, B.: Model-based testing for software safety: a systematic mapping study. Softw. Qual. J. 26(4), 1327\u20131372 (2017). https:\/\/doi.org\/10.1007\/s11219-017-9386-2","journal-title":"Softw. Qual. J."},{"issue":"11","key":"15_CR20","doi-asserted-by":"publisher","first-page":"3370","DOI":"10.1109\/TC.2016.2532869","volume":"65","author":"RM Hierons","year":"2016","unstructured":"Hierons, R.M., Turker, U.C.: Parallel algorithms for generating harmonised state identifiers and characterising sets. IEEE Trans. Comput. 65(11), 3370\u20133383 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"15_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2240276.2240281","volume":"15","author":"R Khoury","year":"2012","unstructured":"Khoury, R., Tawbi, N.: Corrective enforcement: a new paradigm of security policy enforcement by monitors. ACM Trans. Inf. Syst. Secur. 15(2), 1\u201327 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.cosrev.2012.01.001","volume":"6","author":"R Khoury","year":"2012","unstructured":"Khoury, R., Tawbi, N.: Which security policies are enforceable by runtime monitors? A survey. Comput. Sci. Rev. 6(1), 27\u201345 (2012)","journal-title":"Comput. Sci. Rev."},{"issue":"8","key":"15_CR23","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D Lee","year":"1996","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines-a survey. Proc. IEEE 84(8), 1090\u20131123 (1996)","journal-title":"Proc. IEEE"},{"key":"15_CR24","unstructured":"Li, Y., Ziyue, Y., Yao, G., Xiangqun, C.: DroidBot: a lightweight UI-guided test input generator for android. In: Proceedings of the International Conference on Software Engineering Companion (ICSE) (2017)"},{"issue":"3","key":"15_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1\u201341 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4, 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-15497-3_6","volume-title":"Computer Security \u2013 ESORICS 2010","author":"J Ligatti","year":"2010","unstructured":"Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 87\u2013100. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_6"},{"key":"15_CR28","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-0-387-34883-4_6","volume-title":"Protocol Test Systems","author":"G Luo","year":"1995","unstructured":"Luo, G., Petrenko, A., Bochmann, G.V.: Selecting test sequences for partially-specified nondeterministic finite state machines. In: Mizuno, T., Higashino, T., Shiratori, N. (eds.) Protocol Test Systems. ITIFIP, pp. 95\u2013110. Springer, Boston, MA (1995). https:\/\/doi.org\/10.1007\/978-0-387-34883-4_6"},{"key":"15_CR29","unstructured":"Lynch, N.A.: An introduction to input\/output automata. PN (1988)"},{"issue":"1","key":"15_CR30","first-page":"4:1","volume":"10","author":"JAP Magalh\u00e3es","year":"2015","unstructured":"Magalh\u00e3es, J.A.P., Silva, L.M.: Sh\u00f5wa: a self-healing framework for web-based applications. ACM Trans. Autonom. Adapt. Syst. 10(1), 4:1\u20134:28 (2015)","journal-title":"ACM Trans. Autonom. Adapt. Syst."},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Memon, A.M., Banerjee, I., Nguyen, B.N., Robbins, B.: The first decade of GUI ripping: extensions, applications, and broader impacts. In: Proceedings of the Working Conference on Reverse Engineering (WCRE) (2013)","DOI":"10.1109\/WCRE.2013.6671275"},{"key":"15_CR32","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-0-387-35062-2_10","volume-title":"Testing of Communicating Systems","author":"A Petrenko","year":"1996","unstructured":"Petrenko, A., Yevtushenko, N., v. Bochmann, G.: Testing deterministic implementations from nondeterministic FSM specifications. In: Baumgarten, B., Burkhardt, H.-J., Giessler, A. (eds.) Testing of Communicating Systems. ITIFIP, pp. 125\u2013140. Springer, Boston, MA (1996). https:\/\/doi.org\/10.1007\/978-0-387-35062-2_10"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Riganelli, O., Micucci, D., Mariani, L.: Healing data loss problems in android apps. In: Proceedings of the International Workshop on Software Faults (IWSF), Co-Located with the International Symposium on Software Reliability Engineering (ISSRE) (2016)","DOI":"10.1109\/ISSREW.2016.50"},{"key":"15_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-030-03427-6_7","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"O Riganelli","year":"2018","unstructured":"Riganelli, O., Micucci, D., Mariani, L.: Increasing the reusability of enforcers with lifecycle events. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 51\u201357. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6_7"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Riganelli, O., Micucci, D., Mariani, L.: Policy enforcement with proactive libraries. In: Proceedings of the IEEE\/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) (2017)","DOI":"10.1109\/SEAMS.2017.9"},{"issue":"2","key":"15_CR36","first-page":"8:1","volume":"14","author":"O Riganelli","year":"2019","unstructured":"Riganelli, O., Micucci, D., Mariani, L.: Controlling interactions with libraries in android apps through runtime enforcement. ACM Trans. Autonom. Adapt. Syst. 14(2), 8:1\u20138:29 (2019)","journal-title":"ACM Trans. Autonom. Adapt. Syst."},{"key":"15_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-319-67531-2_15","volume-title":"Runtime Verification","author":"O Riganelli","year":"2017","unstructured":"Riganelli, O., Micucci, D., Mariani, L., Falcone, Y.: Verifying policy enforcers. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 241\u2013258. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67531-2_15"},{"issue":"4","key":"15_CR38","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0169-7552(88)90064-5","volume":"15","author":"K Sabnani","year":"1988","unstructured":"Sabnani, K., Dahbura, A.: A protocol test generation procedure. Comput. Netw. ISDN Syst. 15(4), 285\u2013297 (1988)","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"4","key":"15_CR39","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1109\/32.16602","volume":"15","author":"DP Sidhu","year":"1989","unstructured":"Sidhu, D.P., Leung, T.K.: Formal methods for protocol testing: a detailed study. IEEE Trans. Softw. Eng. 15(4), 413\u2013426 (1989)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Sidiroglou, S., Laadan, O., Perez, C., Viennot, N., Nieh, J., Keromytis, A.D.: ASSURE: automatic software self-healing using rescue points. In: Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2009)","DOI":"10.1145\/1508244.1508250"},{"issue":"5","key":"15_CR41","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw. Testing Verification Reliabil. 22(5), 297\u2013312 (2012)","journal-title":"Softw. Testing Verification Reliabil."},{"key":"15_CR42","unstructured":"XDA: Xposed (2020). http:\/\/repo.xposed.info\/"},{"key":"15_CR43","unstructured":"Xu, R., Sa\u00efdi, H., Anderson, R.: Aurasium: practical policy enforcement for android applications. In: Proceedings of the USENIX Conference on Security Symposium (Security) (2012)"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60508-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T12:55:21Z","timestamp":1619268921000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-60508-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030605070","9783030605087"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60508-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Los Angeles, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv20.ait.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.95","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.82","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Also accepted and included: an invited paper, 5 tutorial, 6 tool papers, and a benchmark paper. The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}