{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:27:44Z","timestamp":1743089264124,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030821524"},{"type":"electronic","value":"9783030821531"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-82153-1_55","type":"book-chapter","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T23:26:36Z","timestamp":1628292396000},"page":"670-683","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["QBT: Efficient and Flexible Resource Allocation Method for Data Center of State Grid Scenario"],"prefix":"10.1007","author":[{"given":"Zhengdong","family":"Ren","sequence":"first","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guangxian","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,7]]},"reference":[{"issue":"12","key":"55_CR1","doi-asserted-by":"publisher","first-page":"3344","DOI":"10.1109\/TITS.2016.2543263","volume":"17","author":"M Zhu","year":"2016","unstructured":"Zhu, M., et al.: Public vehicles for future urban transportation. IEEE Trans. Intell. Transp. Syst. 17(12), 3344\u20133353 (2016)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"11","key":"55_CR2","doi-asserted-by":"publisher","first-page":"382132","DOI":"10.1155\/2013\/382132","volume":"9","author":"Q Zhang","year":"2013","unstructured":"Zhang, Q., Huang, T., Zhu, Y., Qiu, M.: A case study of sensor data collection and analysis in smart city: provenance in smart food supply chain. Int. J. Distribut. Sensor Netw. 9(11), 382132 (2013)","journal-title":"Int. J. Distribut. Sensor Netw."},{"issue":"2000","key":"55_CR3","doi-asserted-by":"publisher","first-page":"20120310","DOI":"10.1098\/rsta.2012.0310","volume":"371","author":"M Qiu","year":"2013","unstructured":"Qiu, M., et al.: RNA nanotechnology for computer design and in vivo computation. Philos. Trans. R. Soc. A: Math. Phys. Eng. Sci. 371(2000), 20120310 (2013)","journal-title":"Philos. Trans. R. Soc. A: Math. Phys. Eng. Sci."},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Tao, L., Golikov, S., Gai, K., Qiu, M.: A reusable software component for integrated syntax and semantic validation for services computing. In: IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 127\u2013132 (2015)","DOI":"10.1109\/SOSE.2015.10"},{"key":"55_CR5","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: International Conference on Smart Computing and Communication, pp. 236\u2013247 (2016)","DOI":"10.1007\/978-3-319-52015-5_24"},{"key":"55_CR6","unstructured":"Qiu, M., Zhang, K., Huang, M.: An empirical study of web interface design on small display devices. In: IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2004), pp. 29\u201335 (2004)"},{"issue":"1","key":"55_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2017.1600349CM","volume":"55","author":"W Dai","year":"2017","unstructured":"Dai, W., Qiu, M., Qiu, L., Chen, L., Wu, A.: Who moved my data? Privacy protection in smartphones. IEEE Commun. Mag. 55(1), 20\u201325 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"55_CR8","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.future.2015.05.005","volume":"56","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Chen, M., Qiu, M., Gai, K., Liu, M.: A novel pre-cache schema for high performance Android system. Futur. Gener. Comput. Syst. 56, 766\u2013772 (2016)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"55_CR9","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TCSII.2007.892215","volume":"54","author":"Z Shao","year":"2007","unstructured":"Shao, Z., et al.: Real-time dynamic voltage loop scheduling for multi-core embedded systems. IEEE Trans. Circuits Syst. II 54(5), 445\u2013449 (2007)","journal-title":"IEEE Trans. Circuits Syst. II"},{"key":"55_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-030-05764-0_17","volume-title":"Smart Blockchain","author":"H Qiu","year":"2018","unstructured":"Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A Dynamic Scalable Blockchain Based Communication Architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159\u2013166. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05764-0_17"},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"Gao, Y., Iqbal, S., Zhang, P., Qiu, M.: Performance and power analysis of high-density multi-GPGPU architectures: a preliminary case study. In: IEEE 17th International Conference on High Performance Computing (HPCC) (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.68"},{"key":"55_CR12","doi-asserted-by":"publisher","first-page":"324","DOI":"10.3389\/fpls.2013.00324","volume":"4","author":"JC Schultz","year":"2013","unstructured":"Schultz, J.C., Appel, H.M., Ferrieri, A.P., Arnold, T.M.: Flexible resource allocation during plant defense responses. Front. Plant Sci. 4, 324 (2013)","journal-title":"Front. Plant Sci."},{"issue":"3","key":"55_CR13","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1364\/JOCN.10.000240","volume":"10","author":"M Yaghubi-Namaad","year":"2018","unstructured":"Yaghubi-Namaad, M., Rahbar, A.G., Alizadeh, B.: Adaptive modulation and flexible resource allocation in space-division- multiplexed elastic optical networks. J. Opt. Commun. Netw. 10(3), 240\u2013251 (2018)","journal-title":"J. Opt. Commun. Netw."},{"issue":"8","key":"55_CR14","doi-asserted-by":"publisher","first-page":"3217","DOI":"10.1007\/s00453-019-00582-9","volume":"81","author":"D Katz","year":"2019","unstructured":"Katz, D., Schieber, B., Shachnai, H.: Flexible resource allocation to interval jobs. Algorithmica 81(8), 3217\u20133244 (2019)","journal-title":"Algorithmica"},{"issue":"1","key":"55_CR15","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TCOMM.2018.2873344","volume":"67","author":"N Sawyer","year":"2019","unstructured":"Sawyer, N., Smith, D.B.: Flexible resource allocation in device-to-device communications using Stackelberg game theory. IEEE Trans. Commun. 67(1), 653\u2013667 (2019)","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"55_CR16","doi-asserted-by":"publisher","first-page":"1552","DOI":"10.1287\/mnsc.2014.1919","volume":"60","author":"M Angalakudati","year":"2014","unstructured":"Angalakudati, M., et al.: Business analytics for flexible resource allocation under random emergencies. Manage. Sci. 60(6), 1552\u20131573 (2014)","journal-title":"Manage. Sci."},{"issue":"4","key":"55_CR17","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1016\/j.jpdc.2011.12.004","volume":"72","author":"X Tang","year":"2012","unstructured":"Tang, X., Li, K., Qiu, M., Sha, E.H.-M.: A hierarchical reliability-driven scheduling algorithm in grid systems. J. Parallel Distribut. Comput. 72(4), 525\u2013535 (2012)","journal-title":"J. Parallel Distribut. Comput."},{"issue":"3","key":"55_CR18","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TBDATA.2016.2597149","volume":"4","author":"W Dai","year":"2016","unstructured":"Dai, W., Qiu, L., Wu, A., Qiu, M.: Cloud infrastructure resource allocation for big data applications. IEEE Trans. Big Data 4(3), 313\u2013324 (2016)","journal-title":"IEEE Trans. Big Data"},{"issue":"6","key":"55_CR19","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TCAD.2013.2238990","volume":"32","author":"Y Guo","year":"2013","unstructured":"Guo, Y., Zhuge, Q., Hu, J., Yi, J., Qiu, M., Sha, E.H.: Data placement and duplication for embedded multicore systems with scratch pad memory. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(6), 809\u2013817 (2013)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"issue":"4","key":"55_CR20","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCC.2014.71","volume":"1","author":"M Qiu","year":"2014","unstructured":"Qiu, M., Ming, Z., Wang, J., Yang, L.T., Xiang, Y.: Enabling cloud computing in emergency management systems. IEEE Cloud Comput. 1(4), 60\u201367 (2014)","journal-title":"IEEE Cloud Comput."},{"issue":"8","key":"55_CR21","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1109\/TPDS.2013.251","volume":"25","author":"J Niu","year":"2013","unstructured":"Niu, J., Liu, C., Gao, Y., Qiu, M.: Energy efficient task assignment with guaranteed probability satisfying timing constraints for embedded systems. IEEE Trans. Parallel Distrib. Syst. 25(8), 2043\u20132052 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"55_CR22","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.asoc.2018.03.056","volume":"70","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M.: Optimal resource allocation using reinforcement learning for IoT content-centric services. Appl. Soft Comput. 70, 12\u201321 (2018)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"55_CR23","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MNET.2018.1700407","volume":"32","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M.: Reinforcement learning-based content-centric services in mobile sensing. IEEE Netw. 32(4), 34\u201339 (2018)","journal-title":"IEEE Netw."},{"issue":"2","key":"55_CR24","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1002\/cjce.22717","volume":"95","author":"M Kalliski","year":"2017","unstructured":"Kalliski, M., Engell, S.: Real-time resource efficiency indicators for monitoring and optimization of batch-processing plants. Can. J. Chem. Eng. 95(2), 265\u2013280 (2017)","journal-title":"Can. J. Chem. Eng."},{"issue":"4","key":"55_CR25","first-page":"639","volume":"11","author":"Y Yadav","year":"2018","unstructured":"Yadav, Y., Rama Krishna, C.: Real-time resource monitoring approach for detection of hotspot for virtual machine migration. Int. J. Inf. Technol. 11(4), 639\u2013646 (2018)","journal-title":"Int. J. Inf. Technol."},{"issue":"9","key":"55_CR26","doi-asserted-by":"publisher","first-page":"3879","DOI":"10.1007\/s11227-017-1990-1","volume":"73","author":"C Vega","year":"2017","unstructured":"Vega, C., Roquero, P., Leira, R., Gonzalez, I., Aracil, J.: Loginson: a transform and load system for very large-scale log analysis in large IT infrastructures. J. Supercomput. 73(9), 3879\u20133900 (2017)","journal-title":"J. Supercomput."},{"issue":"2","key":"55_CR27","first-page":"65","volume":"39","author":"M Huang","year":"2013","unstructured":"Huang, M., Dong, H., Wang, C.: Web link and transaction log analyses of digital archive websites. T\u02bbu shu kuan hs\u00fceh yu\u0308 tzu\u0306 hs\u00fcn k\u02bbo hs\u00fceh 39(2), 65\u201382 (2013)","journal-title":"T\u02bbu shu kuan hs\u00fceh yu\u0308 tzu\u0306 hs\u00fcn k\u02bbo hs\u00fceh"},{"issue":"6","key":"55_CR28","first-page":"3375","volume":"43","author":"D DiCostanzo","year":"2016","unstructured":"DiCostanzo, D., Ayan, A., Woollard, J., Gupta, N.: SU-F-R-12: prediction of truebeam hardware issues using trajectory log analysis. Med. Phys. (Lancaster) 43(6), 3375 (2016)","journal-title":"Med. Phys. (Lancaster)"},{"key":"55_CR29","doi-asserted-by":"crossref","unstructured":"Brebner, P.C.: Is your cloud elastic enough performance modeling the elasticity of infrastructure as a service (IaaS) cloud applications. In: ICPE 2012 Proceedings of the 3rd ACM\/SPEC International Conference on Performance Engineering, pp.263\u2013266. New York, USA (2012)","DOI":"10.1145\/2188286.2188334"},{"key":"55_CR30","doi-asserted-by":"crossref","unstructured":"Shen, Z., Subbiah, S., Gu, X.: CloudScale: elastic resource scaling for multi tenant cloud systems. In: Proceedings of the 2nd ACM Symposium on Cloud Computing, pp. 1\u201314. New York, USA (Oct. 2011)","DOI":"10.1145\/2038916.2038921"},{"key":"55_CR31","doi-asserted-by":"crossref","unstructured":"Hadji, M., Zeghlache, D.: Minimum cost maximum flow algorithm for dynamic resource allocation in clouds. In: IEEE 5th International Conference on Cloud Computing (CLOUD), pp.876\u2013882. Honolulu (2012)","DOI":"10.1109\/CLOUD.2012.36"},{"key":"55_CR32","doi-asserted-by":"crossref","unstructured":"Duong, T.N.B., Li, X., Goh, R.S.M.: A framework for dynamic resource provisioning and adaptation in IaaS clouds. In: IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 312\u2013319. Athens (2011)","DOI":"10.1109\/CloudCom.2011.49"},{"issue":"1","key":"55_CR33","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1145\/1993744.1993790","volume":"39","author":"J Rao","year":"2011","unstructured":"Rao, J., Bu, X., Wang, K.: Self-adaptive provisioning of virtualized resources in cloud computing. ACM SIGMETRICS Perform. Eval. Rev. 39(1), 321\u2013322 (2011)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"55_CR34","doi-asserted-by":"crossref","unstructured":"Buyya, R., Garg, S.K., Calheiros, R.N.: SLA-oriented resource provisioning for cloud computing challenges, architecture, and solutions. In: International Conference on Cloud and Service Computing (CSC), pp. 1\u201310. Hong Kong, China (2011)","DOI":"10.1109\/CSC.2011.6138522"},{"key":"55_CR35","doi-asserted-by":"crossref","unstructured":"Kranas, P.: ElaaS: an innovative Elasticity as a Service framewor-k for dynamic management across the cloud stack layers. In: Proceedings of Complex, Intelligent and Software Intensive Systems (CISIS), pp. 1042\u20131049. Palermo, Italy, 4\u20136 July (2012)","DOI":"10.1109\/CISIS.2012.117"},{"key":"55_CR36","doi-asserted-by":"crossref","unstructured":"He, S., Guo, L., Guo, Y., Wu, C., Ghanem, M., Han, R.: Elastic application container: a lightweight approach for cloud resource provisioning. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 15\u201322. Fukuoka (2012)","DOI":"10.1109\/AINA.2012.74"},{"key":"55_CR37","unstructured":"Gong, Z., Gu, X., Wilkes, J.: PRESS: predictive elastic resource scaling for cloud systems. In: Proceedings of Network and Service Management, pp. 9\u201316. Niagara Falls, USA, 25\u201329 Oct. (2010)"},{"key":"55_CR38","unstructured":"Jie, Y., Qiu, J., Li, Y.: A profile-based approach to just-in-time scalability for cloud applications. In: IEEE International Conference on Cloud Computing, pp.9\u201316. Bangalore (2009)"},{"key":"55_CR39","unstructured":"Xu, W., et al.: Predictive control for dynamic resource allocation in enterprise data centers. In: 10th IEEE\/IFIP Date of Conference, pp.115\u2013126. Vancouver, Canada, 3\u20137 April (2006)"},{"key":"55_CR40","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Zhao, H., Liu, M.: Energy-aware optimal task assignment for mobile heterogeneous embedded systems in cloud computing. In: IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (2016)","DOI":"10.1109\/CSCloud.2016.48"},{"key":"55_CR41","doi-asserted-by":"crossref","unstructured":"Chen, L., Duan, Y., Qiu, M., Xiong, J., Gai, K.: Adaptive resource allocation optimization in heterogeneous mobile cloud systems. In: IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (2015)","DOI":"10.1109\/CSCloud.2015.60"},{"key":"55_CR42","doi-asserted-by":"crossref","unstructured":"Xu, Y., Li, K., Khac, T.T., Qiu, M.: A multiple priority queueing genetic algorithm for task scheduling on heterogeneous computing systems. In: IEEE 14th International Conference on High Performance Computing (HPCC) (2012)","DOI":"10.1109\/HPCC.2012.91"},{"key":"55_CR43","doi-asserted-by":"crossref","unstructured":"Thakur, K., Qiu, M., Gai, K., Ali, M.L.: An investigation on cyber security threats and security models. In: IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (2015)","DOI":"10.1109\/CSCloud.2015.71"},{"key":"55_CR44","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Elnagdy, S.A.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE 2nd International Conference on Big Data Security on Cloud (CSCloud) (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"55_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wu, J., Deng, J., Qiu, M.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM, pp. 1\u20135 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.950"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82153-1_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T23:54:32Z","timestamp":1628294072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82153-1_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030821524","9783030821531"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82153-1_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/ksem21\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"492","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"164","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}