{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T05:52:37Z","timestamp":1744869157752,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030614690"},{"type":"electronic","value":"9783030614706"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61470-6_2","type":"book-chapter","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T18:03:12Z","timestamp":1603735392000},"page":"9-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Formal Verification of Developer Tests: A Research Agenda Inspired by Mutation Testing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4463-2945","authenticated-orcid":false,"given":"Serge","family":"Demeyer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8525-8198","authenticated-orcid":false,"given":"Ali","family":"Parsai","sequence":"additional","affiliation":[]},{"given":"Sten","family":"Vercammen","sequence":"additional","affiliation":[]},{"given":"Brent","family":"van Bladel","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Abdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"unstructured":"Finding duplicated code with CPD (2020). \nhttps:\/\/pmd.github.io\/latest\/pmd_userdocs_cpd.html\n\n. Accessed July 2020","key":"2_CR1"},{"unstructured":"Abdi, M., Rocha, H., Demeyer, S.: Test amplification in the pharo smalltalk ecosystem. In: Proceedings IWST 2019 International Workshop on Smalltalk Technologies. ESUG (2019)","key":"2_CR2"},{"unstructured":"Agibalov, A.: What is a normal \u201cfunctional lines of code\u201d to \u201ctest lines of code\u201d ratio? (2015). \nhttps:\/\/softwareengineering.stackexchange.com\/questions\/156883\/\n\n. Accessed Aug 2020","key":"2_CR3"},{"unstructured":"Aichernig, B.K., Lorber, F., Tiran, S.: Formal test-driven development with verified test cases. In: Proceedings MODELSWARD 2014 2nd International Conference on Model-Driven Engineering and Software Development, pp. 626\u2013635 (2014)","key":"2_CR4"},{"issue":"11","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/TSE.2014.2342227","volume":"40","author":"D Athanasiou","year":"2014","unstructured":"Athanasiou, D., Nugroho, A., Visser, J., Zaidman, A.: Test code quality and its relation to issue handling performance. IEEE Trans. Softw. Eng. 40(11), 1100\u20131125 (2014). \nhttps:\/\/doi.org\/10.1109\/TSE.2014.2342227","journal-title":"IEEE Trans. Softw. Eng."},{"key":"2_CR6","volume-title":"DevOps: A Software Architect\u2019s Perspective","author":"L Bass","year":"2015","unstructured":"Bass, L., Weber, I., Zhu, L.: DevOps: A Software Architect\u2019s Perspective. Addison-Wesley Longman Publishing Co. Inc., Boston (2015)"},{"doi-asserted-by":"publisher","unstructured":"van Bladel, B., Demeyer, S.: A novel approach for detecting Type-IV clones in test code. In: Proceedings IWSC 2019 IEEE 13th International Workshop on Software Clones, pp. 102\u2013118. IEEE (2019). \nhttps:\/\/doi.org\/10.1109\/IWSC.2019.8665855","key":"2_CR7","DOI":"10.1109\/IWSC.2019.8665855"},{"doi-asserted-by":"publisher","unstructured":"van Bladel, B., Demeyer, S.: Clone detection in test code: an empirical evaluation. In: Proceedings SANER 2020 International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 492\u2013500. IEEE (2020). \nhttps:\/\/doi.org\/10.1109\/SANER48275.2020.9054798","key":"2_CR8","DOI":"10.1109\/SANER48275.2020.9054798"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-17071-3_11","volume-title":"Formal Methods for Components and Objects","author":"A Brillout","year":"2010","unstructured":"Brillout, A., et al.: Mutation-based test case generation for simulink models. In: de Boer, F.S., Bonsangue, M.M., Hallerstede, S., Leuschel, M. (eds.) FMCO 2009. LNCS, vol. 6286, pp. 208\u2013227. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-17071-3_11"},{"doi-asserted-by":"crossref","unstructured":"Cordy, J.R., Roy, C.K.: The NiCad clone detector. In: 2011 IEEE 19th International Conference on Program Comprehension, pp. 219\u2013220. IEEE (2011)","key":"2_CR10","DOI":"10.1109\/ICPC.2011.26"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"110398","DOI":"10.1016\/j.jss.2019.110398","volume":"157","author":"B Danglot","year":"2019","unstructured":"Danglot, B., Vera-Perez, O., Yu, Z., Zaidman, A., Monperrus, M., Baudry, B.: A snowballing literature study on test amplification. J. Syst. Softw. 157, 110398 (2019)","journal-title":"J. Syst. Softw."},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"2603","DOI":"10.1007\/s10664-019-09692-y","volume":"24","author":"B Danglot","year":"2019","unstructured":"Danglot, B., Vera-P\u00e9rez, O.L., Baudry, B., Monperrus, M.: Automatic test improvement with dspot: a study with ten mature open-source projects. Empirical Softw. Eng. 24, 2603\u20132635 (2019)","journal-title":"Empirical Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Daniel, B., Jagannath, V., Dig, D., Marinov, D.: Reassert: Suggesting repairs for broken unit tests. In: Proceedings ASE 2009 International Conference on Automated Software Engineering, pp. 433\u2013444. IEEE CS (2009). \nhttps:\/\/doi.org\/10.1109\/ASE.2009.17","key":"2_CR13","DOI":"10.1109\/ASE.2009.17"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2018.03.010","volume":"141","author":"X Devroey","year":"2018","unstructured":"Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.Y., Heymans, P.: Model-based mutant equivalence detection using automata language equivalence and simulations. J. Syst. Softw. 141, 1\u201315 (2018). \nhttps:\/\/doi.org\/10.1016\/j.jss.2018.03.010","journal-title":"J. Syst. Softw."},{"unstructured":"Fewster, M., Graham, D.: Software Test Automation: Effective Use of Test Execution Tools. ACM Press Series. Addison-Wesley (1999)","key":"2_CR15"},{"doi-asserted-by":"crossref","unstructured":"G\u00f6de, N., Koschke, R.: Incremental clone detection. In: 2009 13th European Conference on Software Maintenance and Reengineering, pp. 219\u2013228. IEEE (2009)","key":"2_CR16","DOI":"10.1109\/CSMR.2009.20"},{"doi-asserted-by":"publisher","unstructured":"H\u00e4hnle, R.: Quo vadis formal verification? In: Ahrendt, W., Beckert, B., Bubel, R., H\u00e4hnle, R., Schmitt, P.H., Ulbrich, M. (eds.) Deductive Software Verification - The KeY Book: From Theory to Practice, pp. 1\u201319. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-49812-6_1","key":"2_CR17","DOI":"10.1007\/978-3-319-49812-6_1"},{"issue":"5","key":"2_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/52.57887","volume":"7","author":"A Hall","year":"1990","unstructured":"Hall, A.: Seven myths of formal methods. IEEE Softw. 7(5), 11\u201319 (1990). \nhttps:\/\/doi.org\/10.1109\/52.57887","journal-title":"IEEE Softw."},{"doi-asserted-by":"publisher","unstructured":"Hasanain, W., Labiche, Y., Eldh, S.: An analysis of complex industrial test code using clone analysis. In: Proceedings QRS 2018 IEEE International Conference on Software Quality, Reliability and Security, pp. 482\u2013489. IEEE (2018). \nhttps:\/\/doi.org\/10.1109\/QRS.2018.00061","key":"2_CR19","DOI":"10.1109\/QRS.2018.00061"},{"doi-asserted-by":"publisher","unstructured":"Hiep, H.D.A., Maathuis, O., Bian, J., de Boer, F.S., van Eekelen, M., de Gouw, S.: Verifying openjdk\u2019s linkedlist using key. In: Biere, A., Parker, D. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, pp. 217\u2013234. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-45237-7_13","key":"2_CR20","DOI":"10.1007\/978-3-030-45237-7_13"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-20398-5_4","volume-title":"NASA Formal Methods","author":"B Jacobs","year":"2011","unstructured":"Jacobs, B., Smans, J., Philippaerts, P., Vogels, F., Penninckx, W., Piessens, F.: VeriFast: a powerful, sound, predictable, fast verifier for C and Java. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 41\u201355. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-20398-5_4"},{"unstructured":"Jenkins, J.: Velocity culture. In: Keynote Address at the Velocity 2011 Conference (2011)","key":"2_CR22"},{"issue":"5","key":"2_CR23","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. IEEE Trans. Softw. Eng. 37(5), 649\u2013678 (2011). \nhttps:\/\/doi.org\/10.1109\/TSE.2010.62","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"7","key":"2_CR24","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1002\/spe.4380210704","volume":"21","author":"KN King","year":"1991","unstructured":"King, K.N., Offutt, A.J.: A fortran language system for mutation-based software testing. Softw. Pract. Exp. 21(7), 685\u2013718 (1991). \nhttps:\/\/doi.org\/10.1002\/spe.4380210704","journal-title":"Softw. Pract. Exp."},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.07.009","volume":"68","author":"M Kintis","year":"2015","unstructured":"Kintis, M., Malevris, N.: MEDIC: a static analysis framework for equivalent mutant identification. Inf. Softw. Technol. 68, 1\u201317 (2015). \nhttps:\/\/doi.org\/10.1016\/j.infsof.2015.07.009","journal-title":"Inf. Softw. Technol."},{"unstructured":"Koschke, R.: Survey of research on software clones. In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik (2007)","key":"2_CR26"},{"issue":"4","key":"2_CR27","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TSE.2016.2597136","volume":"43","author":"N Li","year":"2016","unstructured":"Li, N., Offutt, J.: Test oracle strategies for model-based testing. IEEE Trans. Softw. Eng. 43(4), 372\u2013395 (2016). \nhttps:\/\/doi.org\/10.1109\/TSE.2016.2597136","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Lu, Z.X., Vercammen, S., Demeyer, S.: Semi-automatic test case expansion for mutation testing. In: Proceedings VST 2020 IEEE Workshop on Validation, Analysis and Evolution of Software Tests, pp. 1\u20137 (2020). \nhttps:\/\/doi.org\/10.1109\/VST50071.2020.9051637","key":"2_CR28","DOI":"10.1109\/VST50071.2020.9051637"},{"doi-asserted-by":"publisher","unstructured":"Luo, Q., Hariri, F., Eloussi, L., Marinov, D.: An empirical analysis of flaky tests. In: Proceedings FSE 2014 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 643\u2013453. Association for Computing Machinery, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2635868.2635920","key":"2_CR29","DOI":"10.1145\/2635868.2635920"},{"unstructured":"Rob, M.: Everything you need to know about tesla software updates (2014). \nhttps:\/\/www.teslarati.com\/everything-need-to-know-tesla-software-updates\/\n\n. Accessed May 2020","key":"2_CR30"},{"issue":"1","key":"2_CR31","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TSE.2013.44","volume":"40","author":"L Madeyski","year":"2014","unstructured":"Madeyski, L., Orzeszyna, W., Torkar, R., Jozala, M.: Overcoming the equivalent mutant problem: a systematic literature review and a comparative experiment of second order mutation. IEEE Trans. Softw. Eng. 40(1), 23\u201342 (2014). \nhttps:\/\/doi.org\/10.1109\/TSE.2013.44","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Marcozzi, M., Bardin, S., Kosmatov, N., Papadakis, M., Prevosto, V., Correnson, L.: Time to clean your test objectives. In: Proceedings ICSE 2018 40th International Conference on Software Engineering, pp. 456\u2013467. Association for Computing Machinery, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3180155.3180191","key":"2_CR32","DOI":"10.1145\/3180155.3180191"},{"doi-asserted-by":"publisher","unstructured":"Offutt, A.J., Pan, J.: Automatically detecting equivalent mutants and infeasible paths. Softw. Test. Verification Reliab. 7(3), 165\u2013192 (1997). \nhttps:\/\/doi.org\/10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U","key":"2_CR33","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U"},{"doi-asserted-by":"publisher","unstructured":"Papadakis, M., Jia, Y., Harman, M., Le Traon, Y.: Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique. In: Proceedings of the 37th International Conference on Software Engineering, Piscataway, NJ, USA, vol. 1, pp. 936\u2013946. IEEE Press (2015). \nhttps:\/\/doi.org\/10.1109\/ICSE.2015.103","key":"2_CR34","DOI":"10.1109\/ICSE.2015.103"},{"key":"2_CR35","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/bs.adcom.2018.03.015","volume":"112","author":"M Papadakis","year":"2019","unstructured":"Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Traon, Y.L., Harman, M.: Mutation testing advances: an analysis and survey. Adv. Comput. 112, 275\u2013378 (2019). \nhttps:\/\/doi.org\/10.1016\/bs.adcom.2018.03.015","journal-title":"Adv. Comput."},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-030-10801-4_33","volume-title":"SOFSEM 2019: Theory and Practice of Computer Science","author":"A Parsai","year":"2019","unstructured":"Parsai, A., Demeyer, S.: Do null-type mutation operators help prevent null-type faults? In: Catania, B., Kr\u00e1lovi\u010d, R., Nawrocki, J., Pighizzini, G. (eds.) SOFSEM 2019. LNCS, vol. 11376, pp. 419\u2013434. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-10801-4_33"},{"doi-asserted-by":"publisher","unstructured":"Parsai, A., Demeyer, S.: Comparing mutation coverage against branch coverage in an industrial setting. Int. J. Softw. Tools Technol. Transfer (2020). \nhttps:\/\/doi.org\/10.1007\/s10009-020-00567-y","key":"2_CR37","DOI":"10.1007\/s10009-020-00567-y"},{"key":"2_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-99927-2_9","volume-title":"Testing Software and Systems","author":"A Parsai","year":"2018","unstructured":"Parsai, A., Demeyer, S., De Busser, S.: C++11\/14 mutation operators based on common fault patterns. In: Medina-Bulo, I., Merayo, M.G., Hierons, R. (eds.) ICTSS 2018. LNCS, vol. 11146, pp. 102\u2013118. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-99927-2_9"},{"doi-asserted-by":"crossref","unstructured":"Roy, C.K., Cordy, J.R.: Benchmarks for software clone detection: a ten-year retrospective. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (JSS), pp. 26\u201337. IEEE (2018)","key":"2_CR39","DOI":"10.1109\/SANER.2018.8330194"},{"issue":"7","key":"2_CR40","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy, C.K., Cordy, J.R., Koschke, R.: Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci. Comput. Program. 74(7), 470\u2013495 (2009)","journal-title":"Sci. Comput. Program."},{"doi-asserted-by":"publisher","unstructured":"Shi, A., Bell, J., Marinov, D.: Mitigating the effects of flaky tests on mutation testing. In: Proceedings ISSTA 2019 the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 112\u2013122. Association for Computing Machinery, New York (2019). \nhttps:\/\/doi.org\/10.1145\/3293882.3330568","key":"2_CR41","DOI":"10.1145\/3293882.3330568"},{"doi-asserted-by":"crossref","unstructured":"Svajlenko, J., Islam, J.F., Keivanloo, I., Roy, C.K., Mia, M.M.: Towards a big data curated benchmark of inter-project code clones. In: 2014 IEEE International Conference on Software Maintenance and Evolution, pp. 476\u2013480 (2014)","key":"2_CR42","DOI":"10.1109\/ICSME.2014.77"},{"doi-asserted-by":"publisher","unstructured":"Tillmann, N., Schulte, W.: Unit tests reloaded: parameterized unit testing with symbolic execution. IEEE Softw. 23(4) (2006). \nhttps:\/\/doi.org\/10.1109\/MS.2006.117","key":"2_CR43","DOI":"10.1109\/MS.2006.117"},{"doi-asserted-by":"publisher","unstructured":"Tonella, P.: Evolutionary testing of classes. In: Proceedings ISSTA 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 119\u2013128. Association for Computing Machinery, New York (2004). \nhttps:\/\/doi.org\/10.1145\/1007512.1007528","key":"2_CR44","DOI":"10.1145\/1007512.1007528"},{"issue":"12","key":"2_CR45","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/TSE.2007.70745","volume":"33","author":"B Van Rompaey","year":"2007","unstructured":"Van Rompaey, B., Du Bois, B., Demeyer, S., Rieger, M.: On the detection of test smells: a metrics-based approach for general fixture and eager test. IEEE Trans. Softw. Eng. 33(12), 800\u2013817 (2007). \nhttps:\/\/doi.org\/10.1109\/TSE.2007.70745","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Vercammen, S., Demeyer, S., Borg, M., Eldh, S.: Speeding up mutation testing via the cloud: lessons learned for further optimisations. In: Proceedings ESEM 2018 12th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 26:1\u201326:9. ACM, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3239235.3240506","key":"2_CR46","DOI":"10.1145\/3239235.3240506"},{"key":"2_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/11785477_23","volume-title":"ECOOP 2006 \u2013 Object-Oriented Programming","author":"T Xie","year":"2006","unstructured":"Xie, T.: Augmenting automatically generated unit-test suites with regression oracle checking. In: Thomas, D. (ed.) ECOOP 2006. LNCS, vol. 4067, pp. 380\u2013403. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11785477_23"},{"issue":"3","key":"2_CR48","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s10664-010-9143-7","volume":"16","author":"A Zaidman","year":"2011","unstructured":"Zaidman, A., Rompaey, B.V., van Deursen, A., Demeyer, S.: Studying the co-evolution of production and test code in open source and industrial developer test processes through repository mining. Int. J. Empirical Softw. Eng. 16(3), 325\u2013364 (2011). \nhttps:\/\/doi.org\/10.1007\/s10664-010-9143-7","journal-title":"Int. J. Empirical Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61470-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T18:04:28Z","timestamp":1603735468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61470-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030614690","9783030614706"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61470-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"27 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isola-conference.org\/isola2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}