{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:04:41Z","timestamp":1743059081763,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030605070"},{"type":"electronic","value":"9783030605087"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60508-7_4","type":"book-chapter","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T04:33:06Z","timestamp":1602045186000},"page":"67-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Analysing the Performance of Python-Based Web Services with the VyPR Framework"],"prefix":"10.1007","author":[{"given":"Joshua Heneage","family":"Dawes","sequence":"first","affiliation":[]},{"given":"Marta","family":"Han","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Javed","sequence":"additional","affiliation":[]},{"given":"Giles","family":"Reger","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Franzoni","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Pfeiffer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"4_CR1","unstructured":"Call Graphs for Python. https:\/\/github.com\/jrfonseca\/gprof2dot"},{"key":"4_CR2","unstructured":"cProfiler. https:\/\/docs.python.org\/2\/library\/profile.html#module-cProfile"},{"key":"4_CR3","unstructured":"Extending Python with C. https:\/\/docs.python.org\/2.7\/extending\/extending.html"},{"key":"4_CR4","unstructured":"Network Time Protocol. http:\/\/www.ntp.org"},{"key":"4_CR5","unstructured":"pyinstrument. https:\/\/github.com\/joerick\/pyinstrument"},{"key":"4_CR6","unstructured":"Python\u2019s GIL. https:\/\/wiki.python.org\/moin\/GlobalInterpreterLock"},{"key":"4_CR7","unstructured":"SQLAlchemy for Python. https:\/\/www.sqlalchemy.org"},{"key":"4_CR8","unstructured":"SQLite. https:\/\/www.sqlite.org\/index.html"},{"key":"4_CR9","unstructured":"The CMS Experiment at CERN. http:\/\/cms.cern"},{"key":"4_CR10","unstructured":"The Flask Framework. https:\/\/flask.palletsprojects.com\/en\/1.1.x\/"},{"key":"4_CR11","unstructured":"The LHC. https:\/\/home.cern\/science\/accelerators\/large-hadron-collider"},{"key":"4_CR12","unstructured":"The Python Programming Language. https:\/\/github.com\/python\/cpython"},{"key":"4_CR13","unstructured":"trace - the Python tracing tool. https:\/\/docs.python.org\/2\/library\/trace.html"},{"key":"4_CR14","unstructured":"What is Deterministic Profiling? https:\/\/docs.python.org\/2.4\/lib\/node453.html"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-540-24730-2_35","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R Alur","year":"2004","unstructured":"Alur, R., Etessami, K., Madhusudan, P.: A temporal logic of nested calls and returns. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 467\u2013481. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24730-2_35"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Ball, T., Naik, M., Rajamani, S.K.: From symptom to cause: localizing errors in counterexample traces. In: Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2003, pp. 97\u2013105. Association for Computing Machinery, New York (2003). https:\/\/doi.org\/10.1145\/604131.604140","DOI":"10.1145\/604131.604140"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Bensalem, S., Bozga, M., Krichen, M., Tripakis, S.: Testing conformance of real-time applications by automatic generation of observers. Electron. Notes Theor. Comput. Sci. 113, 23\u201343 (2005). Proceedings of the Fourth Workshop on Runtime Verification (RV 2004). https:\/\/doi.org\/10.1016\/j.entcs.2004.01.036. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S157106610405251X","DOI":"10.1016\/j.entcs.2004.01.036"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-030-30446-1_4","volume-title":"Software Engineering and Formal Methods","author":"E Bartocci","year":"2019","unstructured":"Bartocci, E., Manjunath, N., Mariani, L., Mateis, C., Ni\u010dkovi\u0107, D.: Automatic failure explanation in CPS models. In: \u00d6lveczky, P.C., Sala\u00fcn, G. (eds.) SEFM 2019. LNCS, vol. 11724, pp. 69\u201386. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30446-1_4"},{"issue":"4","key":"4_CR20","doi-asserted-by":"publisher","first-page":"14:1","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4), 14:1\u201314:64 (2011). https:\/\/doi.org\/10.1145\/2000799.2000800","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Beck, F., Moseler, O., Diehl, S., Rey, G.D.: In situ understanding of performance bottlenecks through visually augmented code. In: 2013 21st International Conference on Program Comprehension (ICPC), pp. 63\u201372 (2013)","DOI":"10.1109\/ICPC.2013.6613834"},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s10703-011-0132-2","volume":"40","author":"I Beer","year":"2012","unstructured":"Beer, I., Ben-David, S., Chockler, H., Orni, A., Trefler, R.: Explaining counterexamples using causality. Formal Methods Syst. Des. 40(1), 20\u201340 (2012). https:\/\/doi.org\/10.1007\/s10703-011-0132-2","journal-title":"Formal Methods Syst. Des."},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32759-9_9"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-319-21215-9_3","volume-title":"Tests and Proofs","author":"G Birch","year":"2015","unstructured":"Birch, G., Fischer, B., Poppleton, M.R.: Fast model-based fault localisation with test suites. In: Blanchette, J.C., Kosmatov, N. (eds.) TAP 2015. LNCS, vol. 9154, pp. 38\u201357. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21215-9_3"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-030-17462-0_13","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M Christakis","year":"2019","unstructured":"Christakis, M., Heizmann, M., Mansur, M.N., Schilling, C., W\u00fcstholz, V.: Semantic fault localization and suspiciousness ranking. In: Vojnar, T., Zhang, L. (eds.) TACAS 2019. LNCS, vol. 11427, pp. 226\u2013243. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17462-0_13"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Cito, J., Leitner, P., Rinard, M., Gall, H.C.: Interactive production performance feedback in the IDE. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 971\u2013981 (2019)","DOI":"10.1109\/ICSE.2019.00102"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Cito, J., Oliveira, F., Leitner, P., Nagpurkar, P., Gall, H.C.: Context-based analytics - establishing explicit links between runtime traces and source code. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP), pp. 193\u2013202 (2017)","DOI":"10.1109\/ICSE-SEIP.2017.1"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Clarke, E., Jha, S., Lu, Y., Veith, H.: Tree-like counterexamples in model checking, pp. 19\u201329, February 2002. https:\/\/doi.org\/10.1109\/LICS.2002.1029814","DOI":"10.1109\/LICS.2002.1029814"},{"key":"4_CR29","unstructured":"D\u2019Angelo, B., et al.: LOLA: runtime monitoring of synchronous systems. In: 12th International Symposium on Temporal Representation and Reasoning (TIME 2005), pp. 166\u2013174. IEEE Computer Society Press, June 2005"},{"key":"4_CR30","unstructured":"Dawes, J.H., Han, M., Reger, G., Franzoni, G., Pfeiffer, A.: Analysis tools for the VyPR framework for Python. In: 2019 International Conference on Computing in High Energy and Nuclear Physics, Adelaide, Australia (2019)"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-030-32079-9_12","volume-title":"Runtime Verification","author":"JH Dawes","year":"2019","unstructured":"Dawes, J.H., Reger, G.: Explaining violations of properties in Control-Flow Temporal Logic. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 202\u2013220. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_12"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Dawes, J.H., Reger, G.: Specification of temporal properties of functions for runtime verification. In: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, 8\u201312 April 2019, pp. 2206\u20132214 (2019). https:\/\/doi.org\/10.1145\/3297280.3297497","DOI":"10.1145\/3297280.3297497"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-030-17465-1_6","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"JH Dawes","year":"2019","unstructured":"Dawes, J.H., Reger, G., Franzoni, G., Pfeiffer, A., Govi, G.: VyPR2: a framework for runtime verification of Python web services. In: Vojnar, T., Zhang, L. (eds.) TACAS 2019. LNCS, vol. 11428, pp. 98\u2013114. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17465-1_6"},{"key":"4_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-030-03769-7_14","volume-title":"Runtime Verification","author":"Y Falcone","year":"2018","unstructured":"Falcone, Y., Krsti\u0107, S., Reger, G., Traytel, D.: A taxonomy for classifying runtime verification tools. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 241\u2013262. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_14"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-319-24953-7_20","volume-title":"Automated Technology for Verification and Analysis","author":"T Ferr\u00e8re","year":"2015","unstructured":"Ferr\u00e8re, T., Maler, O., Ni\u010dkovi\u0107, D.: Trace diagnostics using temporal implicants. In: Finkbeiner, B., Pu, G., Zhang, L. (eds.) ATVA 2015. LNCS, vol. 9364, pp. 241\u2013258. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24953-7_20"},{"key":"4_CR36","doi-asserted-by":"publisher","unstructured":"Hall\u00e9, S., Varvaressos, S.: A formalization of complex event stream processing, vol. 2014, pp. 2\u201311, September 2014. https:\/\/doi.org\/10.1109\/EDOC.2014.12","DOI":"10.1109\/EDOC.2014.12"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Javed, O., et al.: PerfCI: a toolchain for automated performance testing during continuous integration of Python projects. In: 2020 International Conference on Automated Software Engineering (2020, to appear)","DOI":"10.1145\/3324884.3415288"},{"issue":"4","key":"4_CR38","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/BF01995674","volume":"2","author":"R Koymans","year":"1990","unstructured":"Koymans, R.: Specifying real-time properties with metric temporal logic. Real-Time Syst. 2(4), 255\u2013299 (1990). https:\/\/doi.org\/10.1007\/BF01995674","journal-title":"Real-Time Syst."},{"key":"4_CR39","doi-asserted-by":"publisher","unstructured":"Papadopoulos, I., Chytracek, R., Duellmann, D., Govi, G., Shapiro, Y., Xie, Z.: CORAL, a software system for vendor-neutral access to relational databases, pp. 495\u2013499, April 2006. https:\/\/doi.org\/10.1142\/9789812773678_0082","DOI":"10.1142\/9789812773678_0082"},{"key":"4_CR40","doi-asserted-by":"publisher","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science (SFCS 1977), pp. 46\u201357, October 1977. https:\/\/doi.org\/10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"key":"4_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-319-23820-3_20","volume-title":"Runtime Verification","author":"G Reger","year":"2015","unstructured":"Reger, G.: Suggesting edits to explain failing traces. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 287\u2013293. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_20"},{"key":"4_CR42","doi-asserted-by":"publisher","unstructured":"Reger, G.: A report of RV-CuBES 2017. In: Reger, G., Havelund, K. (eds.) RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools. Kalpa Publications in Computing, vol. 3, pp. 1\u20139. EasyChair (2017). https:\/\/doi.org\/10.29007\/2496. https:\/\/easychair.org\/publications\/paper\/MVXk","DOI":"10.29007\/2496"},{"key":"4_CR43","doi-asserted-by":"publisher","unstructured":"Reiter, R.: A theory of diagnosis from first principles. Artif. Intell. 32(1), 57\u201395 (1987). https:\/\/doi.org\/10.1016\/0004-3702(87)90062-2. http:\/\/www.sciencedirect.com\/science\/article\/pii\/0004370287900622","DOI":"10.1016\/0004-3702(87)90062-2"},{"key":"4_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-44829-2_8","volume-title":"Model Checking Software","author":"A Groce","year":"2003","unstructured":"Groce, A., Visser, W.: What went wrong: explaining counterexamples. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol. 2648, pp. 121\u2013136. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-44829-2_8"},{"key":"4_CR45","unstructured":"de Souza, H.A., Chaim, M.L., Kon, F.: Spectrum-based software fault localization: a survey of techniques, advances, and challenges. CoRR abs\/1607.04347 (2016). http:\/\/arxiv.org\/abs\/1607.04347"},{"key":"4_CR46","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1007\/3-540-48035-8_72","volume-title":"Developments in Applied Artificial Intelligence","author":"F Wotawa","year":"2002","unstructured":"Wotawa, F., Stumptner, M., Mayer, W.: Model-based debugging or how to diagnose programs automatically. In: Hendtlass, T., Ali, M. (eds.) IEA\/AIE 2002. LNCS (LNAI), vol. 2358, pp. 746\u2013757. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-48035-8_72. http:\/\/dl.acm.org\/citation.cfm?id=646864.708248"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60508-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T12:53:37Z","timestamp":1619268817000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-60508-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030605070","9783030605087"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60508-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Los Angeles, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv20.ait.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.95","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.82","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Also accepted and included: an invited paper, 5 tutorial, 6 tool papers, and a benchmark paper. The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}