{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:34:23Z","timestamp":1743118463932,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030788100"},{"type":"electronic","value":"9783030788117"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78811-7_37","type":"book-chapter","created":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T23:22:37Z","timestamp":1625613757000},"page":"391-406","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mining Neighbor Frames for Person Re-identification by Global Optimal Tracking"],"prefix":"10.1007","author":[{"given":"Kai","family":"Han","sequence":"first","affiliation":[]},{"given":"Jinho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Lang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Fangcheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Seiichi","family":"Uchida","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,7]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Berclaz, J., Fleuret, F., Fua, P.: Robust people tracking with global trajectory optimization. In: CVPR, vol. 1, pp. 744\u2013750. IEEE (2006)","key":"37_CR1","DOI":"10.1109\/CVPR.2006.258"},{"key":"37_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-58452-8_13","volume-title":"Computer Vision \u2013 ECCV 2020","author":"N Carion","year":"2020","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-end object detection with transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12346, pp. 213\u2013229. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13"},{"issue":"10","key":"37_CR3","doi-asserted-by":"publisher","first-page":"2993","DOI":"10.1016\/j.patcog.2015.04.005","volume":"48","author":"S Ding","year":"2015","unstructured":"Ding, S., Lin, L., Wang, G., Chao, H.: Deep feature learning with relative distance comparison for person re-identification. Pattern Recogn. 48(10), 2993\u20133003 (2015)","journal-title":"Pattern Recogn."},{"unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: ICLR (2021)","key":"37_CR4"},{"issue":"9","key":"37_CR5","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TPAMI.2009.167","volume":"32","author":"PF Felzenszwalb","year":"2010","unstructured":"Felzenszwalb, P.F., Girshick, R.B., McAllester, D., Ramanan, D.: Object detection with discriminatively trained part-based models. TPAMI 32(9), 1627\u20131645 (2010)","journal-title":"TPAMI"},{"unstructured":"Gao, J., Nevatia, R.: Revisiting temporal modeling for video-based person reid. In: BMVC (2018)","key":"37_CR6"},{"doi-asserted-by":"crossref","unstructured":"Guo, J., Yuan, Y., Huang, L., Zhang, C., Yao, J.G., Han, K.: Beyond human parts: dual part-aligned representations for person re-identification. In: ICCV, pp. 3642\u20133651 (2019)","key":"37_CR7","DOI":"10.1109\/ICCV.2019.00374"},{"doi-asserted-by":"crossref","unstructured":"Han, K., Guo, J., Zhang, C., Zhu, M.: Attribute-aware attention model for fine-grained representation learning. In: ACMMM, pp. 2040\u20132048 (2018)","key":"37_CR8","DOI":"10.1145\/3240508.3240550"},{"doi-asserted-by":"crossref","unstructured":"Han, K., Wang, Y., Tian, Q., Guo, J., Xu, C., Xu, C.: GhostNet: more features from cheap operations. In: CVPR, pp. 1580\u20131589 (2020)","key":"37_CR9","DOI":"10.1109\/CVPR42600.2020.00165"},{"unstructured":"Han, K., Xiao, A., Wu, E., Guo, J., Xu, C., Wang, Y.: Transformer in transformer. arXiv:2103.00112 (2021)","key":"37_CR10"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770\u2013778 (2016)","key":"37_CR11","DOI":"10.1109\/CVPR.2016.90"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-21227-7_9","volume-title":"Image Analysis","author":"M Hirzer","year":"2011","unstructured":"Hirzer, M., Beleznai, C., Roth, P.M., Bischof, H.: Person re-identification by descriptive and discriminative classification. In: Heyden, A., Kahl, F. (eds.) SCIA 2011. LNCS, vol. 6688, pp. 91\u2013102. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21227-7_9"},{"unstructured":"Huang, L., Yuan, Y., Guo, J., Zhang, C., Chen, X., Wang, J.: Interlaced sparse self-attention for semantic segmentation. arXiv:1907.12273 (2019)","key":"37_CR13"},{"doi-asserted-by":"crossref","unstructured":"Jiang, H., Fels, S., Little, J.J.: A linear programming approach for multiple object tracking. In: CVPR, pp. 1\u20138. IEEE (2007)","key":"37_CR14","DOI":"10.1109\/CVPR.2007.383180"},{"doi-asserted-by":"crossref","unstructured":"Kalayeh, M.M., Basaran, E., G\u00f6kmen, M., Kamasak, M.E., Shah, M.: Human semantic parsing for person re-identification. In: CVPR, pp. 1062\u20131071 (2018)","key":"37_CR15","DOI":"10.1109\/CVPR.2018.00117"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-319-75786-5_10","volume-title":"Image and Video Technology","author":"J Lee","year":"2018","unstructured":"Lee, J., Iwana, B.K., Ide, S., Hayashi, H., Uchida, S.: Globally optimal object tracking with complementary use of single shot multibox detector and fully convolutional network. In: Paul, M., Hitoshi, C., Huang, Q. (eds.) PSIVT 2017. LNCS, vol. 10749, pp. 110\u2013122. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75786-5_10"},{"doi-asserted-by":"crossref","unstructured":"Li, J., Wang, J., Tian, Q., Gao, W., Zhang, S.: Global-local temporal representations for video person re-identification. In: ICCV, pp. 3958\u20133967 (2019)","key":"37_CR17","DOI":"10.1109\/ICCV.2019.00406"},{"doi-asserted-by":"crossref","unstructured":"Li, S., Bak, S., Carr, P., Wang, X.: Diversity regularized spatiotemporal attention for video-based person re-identification. In: CVPR, pp. 369\u2013378 (2018)","key":"37_CR18","DOI":"10.1109\/CVPR.2018.00046"},{"doi-asserted-by":"crossref","unstructured":"Li, W., Zhu, X., Gong, S.: Harmonious attention network for person re-identification. In: CVPR, pp. 2285\u20132294 (2018)","key":"37_CR19","DOI":"10.1109\/CVPR.2018.00243"},{"doi-asserted-by":"crossref","unstructured":"Liao, S., Hu, Y., Zhu, X., Li, S.Z.: Person re-identification by local maximal occurrence representation and metric learning. In: CVPR, pp. 2197\u20132206 (2015)","key":"37_CR20","DOI":"10.1109\/CVPR.2015.7298832"},{"doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Neural person search machines. In: ICCV (2017)","key":"37_CR21","DOI":"10.1109\/ICCV.2017.61"},{"key":"37_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"W Liu","year":"2016","unstructured":"Liu, W., et al.: SSD: single shot multibox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"doi-asserted-by":"crossref","unstructured":"McLaughlin, N., del Rincon, J.M., Miller, P.: Recurrent convolutional network for video-based person re-identification. In: CVPR, pp. 1325\u20131334. IEEE (2016)","key":"37_CR23","DOI":"10.1109\/CVPR.2016.148"},{"unstructured":"Paszke, A., et al.: Pytorch: an imperative style, high-performance deep learning library. In: NeurIPS, vol. 32, pp. 8026\u20138037 (2019)","key":"37_CR24"},{"doi-asserted-by":"crossref","unstructured":"Pirsiavash, H., Ramanan, D., Fowlkes, C.C.: Globally-optimal greedy algorithms for tracking a variable number of objects. In: CVPR, pp. 1201\u20131208. IEEE (2011)","key":"37_CR25","DOI":"10.1109\/CVPR.2011.5995604"},{"unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. In: NeurIPS, pp. 91\u201399 (2015)","key":"37_CR26"},{"key":"37_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-48881-3_2","volume-title":"Computer Vision \u2013 ECCV 2016 Workshops","author":"E Ristani","year":"2016","unstructured":"Ristani, E., Solera, F., Zou, R., Cucchiara, R., Tomasi, C.: Performance measures and a data set for\u00a0multi-target, multi-camera tracking. In: Hua, G., J\u00e9gou, H. (eds.) ECCV 2016. LNCS, vol. 9914, pp. 17\u201335. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48881-3_2"},{"doi-asserted-by":"crossref","unstructured":"Schumann, A., Stiefelhagen, R.: Person re-identification by deep learning attribute-complementary information. In: CVPR, pp. 1435\u20131443. IEEE (2017)","key":"37_CR28","DOI":"10.1109\/CVPRW.2017.186"},{"unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: ICLR (2015)","key":"37_CR29"},{"unstructured":"Subramaniam, A., Chatterjee, M., Mittal, A.: Deep neural networks with inexact matching for person re-identification. In: NeurIPS, pp. 2675\u20132683 (2016)","key":"37_CR30"},{"doi-asserted-by":"crossref","unstructured":"Sun, Y., Zheng, L., Deng, W., Wang, S.: SVDNet for pedestrian retrieval. In: CVPR, pp. 3800\u20133808 (2017)","key":"37_CR31","DOI":"10.1109\/ICCV.2017.410"},{"key":"37_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-030-01225-0_30","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Y Sun","year":"2018","unstructured":"Sun, Y., Zheng, L., Yang, Y., Tian, Q., Wang, S.: Beyond part models: person retrieval with refined part pooling (and a strong convolutional baseline). In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11208, pp. 501\u2013518. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01225-0_30"},{"unstructured":"Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: ICML, pp. 6105\u20136114. PMLR (2019)","key":"37_CR33"},{"doi-asserted-by":"crossref","unstructured":"Tang, S., Andriluka, M., Andres, B., Schiele, B.: Multiple people tracking by lifted multicut and person re-identification. In: CVPR, pp. 3539\u20133548 (2017)","key":"37_CR34","DOI":"10.1109\/CVPR.2017.394"},{"key":"37_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-46478-7_9","volume-title":"Computer Vision \u2013 ECCV 2016","author":"RR Varior","year":"2016","unstructured":"Varior, R.R., Shuai, B., Lu, J., Xu, D., Wang, G.: A siamese long short-term memory architecture for human re-identification. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 135\u2013153. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_9"},{"unstructured":"Vaswani, A., et al.: Attention is all you need. In: NeurIPS, vol. 30, pp. 5998\u20136008 (2017)","key":"37_CR36"},{"doi-asserted-by":"crossref","unstructured":"Xiao, T., Li, S., Wang, B., Lin, L., Wang, X.: Joint detection and identification feature learning for person search. In: CVPR, pp. 3376\u20133385. IEEE (2017)","key":"37_CR37","DOI":"10.1109\/CVPR.2017.360"},{"key":"37_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-319-46478-7_28","volume-title":"Computer Vision \u2013 ECCV 2016","author":"H Xu","year":"2016","unstructured":"Xu, H., Saenko, K.: Ask, attend and answer: exploring question-guided spatial attention for visual question answering. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 451\u2013466. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_28"},{"doi-asserted-by":"crossref","unstructured":"Xu, J., Zhao, R., Zhu, F., Wang, H., Ouyang, W.: Attention-aware compositional network for person re-identification. In: CVPR, pp. 2119\u20132128 (2018)","key":"37_CR39","DOI":"10.1109\/CVPR.2018.00226"},{"unstructured":"Xu, K., et al.: Show, attend and tell: neural image caption generation with visual attention. In: ICML, pp. 2048\u20132057 (2015)","key":"37_CR40"},{"doi-asserted-by":"crossref","unstructured":"Xu, S., Cheng, Y., Gu, K., Yang, Y., Chang, S., Zhou, P.: Jointly attentive spatial-temporal pooling networks for video-based person re-identification. In: ICCV, pp. 4733\u20134742 (2017)","key":"37_CR41","DOI":"10.1109\/ICCV.2017.507"},{"key":"37_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/978-3-319-46466-4_42","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Y Yan","year":"2016","unstructured":"Yan, Y., Ni, B., Song, Z., Ma, C., Yan, Y., Yang, X.: Person re-identification via recurrent feature aggregation. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9910, pp. 701\u2013716. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46466-4_42"},{"doi-asserted-by":"crossref","unstructured":"Yang, J., Zheng, W.S., Yang, Q., Chen, Y.C., Tian, Q.: Spatial-temporal graph convolutional network for video-based person re-identification. In: CVPR, pp. 3289\u20133299 (2020)","key":"37_CR43","DOI":"10.1109\/CVPR42600.2020.00335"},{"doi-asserted-by":"crossref","unstructured":"Yang, Z., He, X., Gao, J., Deng, L., Smola, A.: Stacked attention networks for image question answering. In: CVPR, pp. 21\u201329 (2016)","key":"37_CR44","DOI":"10.1109\/CVPR.2016.10"},{"doi-asserted-by":"crossref","unstructured":"Yi, D., Lei, Z., Liao, S., Li, S.Z.: Deep metric learning for person re-identification. In: ICPR, pp. 34\u201339. IEEE (2014)","key":"37_CR45","DOI":"10.1109\/ICPR.2014.16"},{"unstructured":"Yuan, Y., Huang, L., Guo, J., Zhang, C., Chen, X., Wang, J.: OCNet: object context network for scene parsing. In: IJCV (2021)","key":"37_CR46"},{"doi-asserted-by":"crossref","unstructured":"Zeng, K., Ning, M., Wang, Y., Guo, Y.: Hierarchical clustering with hard-batch triplet loss for person re-identification. In: CVPR, pp. 13657\u201313665 (2020)","key":"37_CR47","DOI":"10.1109\/CVPR42600.2020.01367"},{"issue":"4","key":"37_CR48","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1109\/TPAMI.2020.2976969","volume":"43","author":"L Zhang","year":"2021","unstructured":"Zhang, L., et al.: Ordered or orderless: a revisit for video based person re-identification. IEEE Trans. Pattern Anal. Mach. Intell. 43(4), 1460\u20131466 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Zhang, Z., Lan, C., Zeng, W., Jin, X., Chen, Z.: Relation-aware global attention for person re-identification. In: CVPR, pp. 3186\u20133195 (2020)","key":"37_CR49","DOI":"10.1109\/CVPR42600.2020.00325"},{"key":"37_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-319-46466-4_52","volume-title":"Computer Vision \u2013 ECCV 2016","author":"L Zheng","year":"2016","unstructured":"Zheng, L., et al.: MARS: a video benchmark for large-scale person re-identification. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9910, pp. 868\u2013884. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46466-4_52"},{"doi-asserted-by":"crossref","unstructured":"Zheng, L., Zhang, H., Sun, S., Chandraker, M., Yang, Y., Tian, Q.: Person re-identification in the wild. In: CVPR (2017)","key":"37_CR51","DOI":"10.1109\/CVPR.2017.357"},{"issue":"1","key":"37_CR52","first-page":"1","volume":"14","author":"Z Zheng","year":"2017","unstructured":"Zheng, Z., Zheng, L., Yang, Y.: A discriminatively learned CNN embedding for person reidentification. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 14(1), 1\u201320 (2017)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl. (TOMM)"},{"doi-asserted-by":"crossref","unstructured":"Zheng, Z., Zheng, L., Yang, Y.: Unlabeled samples generated by GAN improve the person re-identification baseline in vitro. In: ICCV (2017)","key":"37_CR53","DOI":"10.1109\/ICCV.2017.405"},{"doi-asserted-by":"crossref","unstructured":"Zhong, Z., Zheng, L., Zheng, Z., Li, S., Yang, Y.: Camera style adaptation for person re-identification. In: CVPR (2018)","key":"37_CR54","DOI":"10.1109\/CVPR.2018.00541"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78811-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T13:48:22Z","timestamp":1725371302000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78811-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030788100","9783030788117"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78811-7_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Swarm Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swarm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iasei.org\/icsi2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"177","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}