{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:29Z","timestamp":1742913509834,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030822538"},{"type":"electronic","value":"9783030822545"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-82254-5_8","type":"book-chapter","created":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T22:02:32Z","timestamp":1626732152000},"page":"126-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Convention Emergence with Congested Resources"],"prefix":"10.1007","author":[{"given":"Priel","family":"Levy","sequence":"first","affiliation":[]},{"given":"Nathan","family":"Griffiths","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,20]]},"reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/s10458-013-9237-x","volume":"28","author":"S Airiau","year":"2014","unstructured":"Airiau, S., Sen, S., Villatoro, D.: Emergence of conventions through social learning. Auton. Agent Multi-Agent Syst. 28(5), 779\u2013804 (2014). https:\/\/doi.org\/10.1007\/s10458-013-9237-x","journal-title":"Auton. Agent Multi-Agent Syst."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Amin, K., Kale, S., Tesauro, G., Turaga, D.: Budgeted prediction with expert advice. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 2490\u20132096 (2015)","DOI":"10.1609\/aaai.v29i1.9621"},{"issue":"4","key":"8_CR3","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1177\/0022002794038004008","volume":"38","author":"DG Arce","year":"1994","unstructured":"Arce, D.G.: Stability criteria for social norms with applications to the prisoner\u2019s dilemma. J. Conflict Resolut. 38(4), 749\u2013765 (1994)","journal-title":"J. Conflict Resolut."},{"issue":"2","key":"8_CR4","first-page":"406","volume":"84","author":"WB Arthur","year":"1994","unstructured":"Arthur, W.B.: Inductive reasoning and bounded rationality. Am. Econ. Rev. 84(2), 406\u2013411 (1994)","journal-title":"Am. Econ. Rev."},{"issue":"2\u20133","key":"8_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2\u20133), 235\u2013256 (2002). https:\/\/doi.org\/10.1023\/A:1013689704352","journal-title":"Mach. Learn."},{"key":"8_CR6","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: Gambling in a rigged casino: the adversarial multi-armed bandit problem. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 322\u2013331. IEEE (1995)"},{"issue":"1","key":"8_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: The nonstochastic multiarmed bandit problem. SIAM J. Comput. 32(1), 48\u201377 (2002)","journal-title":"SIAM J. Comput."},{"issue":"4","key":"8_CR8","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1017\/S0003055400185016","volume":"80","author":"R Axelrod","year":"1986","unstructured":"Axelrod, R.: An evolutionary approach to norms. Am. Polit. Sci. Rev. 80(4), 1095\u20131111 (1986)","journal-title":"Am. Polit. Sci. Rev."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Beheshti, R., Ali, A.M., Sukthankar, G.: Cognitive social learners: an architecture for modeling normative behavior. In: Proceedings of the 29th AAAI Conference on Artificial Intelligence, pp. 2017\u20132023 (2015)","DOI":"10.1609\/aaai.v29i1.9441"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0004-3702(02)00121-2","volume":"136","author":"M Bowling","year":"2002","unstructured":"Bowling, M., Veloso, M.: Multiagent learning using a variable learning rate. Artif. Intell. 136(2), 215\u2013250 (2002)","journal-title":"Artif. Intell."},{"issue":"1","key":"8_CR11","first-page":"U61","volume":"4","author":"R Conte","year":"2001","unstructured":"Conte, R., Paolucci, M.: Intelligent social learning. J. Artif. Soc. Soc. Simul. 4(1), U61\u2013U82 (2001)","journal-title":"J. Artif. Soc. Soc. Simul."},{"key":"8_CR12","unstructured":"Farago, J., Greenwald, A., Hall, K.: Fair and efficient solutions to the Santa Fe bar problem. In: Proceedings of the Grace Hopper Celebration of Women in Computing (2002)"},{"issue":"3","key":"8_CR13","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s10458-012-9193-x","volume":"26","author":"H Franks","year":"2012","unstructured":"Franks, H., Griffiths, N., Jhumka, A.: Manipulating convention emergence using influencer agents. Auton. Agent Multi-Agent Syst. 26(3), 315\u2013353 (2012). https:\/\/doi.org\/10.1007\/s10458-012-9193-x","journal-title":"Auton. Agent Multi-Agent Syst."},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-13033-5_21","volume-title":"Trends in Applied Intelligent Systems","author":"O-C Granmo","year":"2010","unstructured":"Granmo, O.-C., Berg, S.: Solving non-stationary bandit problems by random sampling from sibling Kalman filters. In: Garc\u00eda-Pedrajas, N., Herrera, F., Fyfe, C., Ben\u00edtez, J.M., Ali, M. (eds.) IEA\/AIE 2010. LNCS (LNAI), vol. 6098, pp. 199\u2013208. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13033-5_21"},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s10489-012-0346-z","volume":"38","author":"OC Granmo","year":"2013","unstructured":"Granmo, O.C., Glimsdal, S.: Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore game. Appl. Intell. 38(4), 479\u2013488 (2013). https:\/\/doi.org\/10.1007\/s10489-012-0346-z","journal-title":"Appl. Intell."},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888917000169","volume":"32","author":"C Haynes","year":"2017","unstructured":"Haynes, C., Luck, M., McBurney, P., Mahmoud, S., V\u00edtek, T., Miles, S.: Engineering the emergence of norms: a review. Knowl. Eng. Rev. 32, 1\u201331 (2017)","journal-title":"Knowl. Eng. Rev."},{"issue":"3","key":"8_CR17","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1086\/229029","volume":"94","author":"DD Heckathorn","year":"1988","unstructured":"Heckathorn, D.D.: Collective sanctions and the creations of prisoner\u2019s dilemma norms. Am. J. Sociol. 94(3), 535\u2013562 (1988)","journal-title":"Am. J. Sociol."},{"issue":"10","key":"8_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0012530","volume":"5","author":"D Helbing","year":"2010","unstructured":"Helbing, D., Johansson, A.: Cooperation, norms, and revolutions: a unified game-theoretical approach. PLoS ONE 5(10), 1\u201315 (2010)","journal-title":"PLoS ONE"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Hu, S., Leung, H.F.: Achieving coordination in multi-agent systems by stable local conventions under community networks. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI), pp. 4731\u20134737 (2017)","DOI":"10.24963\/ijcai.2017\/659"},{"key":"8_CR20","unstructured":"Kale, S.: Multiarmed bandits with limited expert advice. In: Conference on Learning Theory, pp. 107\u2013122 (2014)"},{"key":"8_CR21","unstructured":"Kittock, J.E.: Emergent conventions and the structure of multi-agent systems. In: Proceedings of the 1993 Santa Fe Institute Complex Systems Summer School, vol. 6, pp. 1\u201314. Citeseer (1993)"},{"key":"8_CR22","first-page":"1","volume":"1","author":"V Kuleshov","year":"2000","unstructured":"Kuleshov, V., Precup, D.: Algorithms for multi-armed bandit problems. J. Mach. Learn. Res. 1, 1\u201348 (2000)","journal-title":"J. Mach. Learn. Res."},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: Proceedings of the 19th International Conference on World Wide Web (WWW), pp. 661\u2013670 (2010)","DOI":"10.1145\/1772690.1772758"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-642-35545-5_11","volume-title":"Coordination, Organizations, Institutions, and Norms in Agent System VII","author":"S Mahmoud","year":"2012","unstructured":"Mahmoud, S., Griffiths, N., Keppens, J., Luck, M.: Overcoming omniscience for norm emergence in axelrod\u2019s metanorm model. In: Cranefield, S., van Riemsdijk, M.B., V\u00e1zquez-Salceda, J., Noriega, P. (eds.) COIN -2011. LNCS (LNAI), vol. 7254, pp. 186\u2013202. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35545-5_11"},{"key":"8_CR25","unstructured":"Mahmoud, S., Griffiths, N., Keppens, J., Luck, M.: Efficient norm emergence through experiential dynamic punishment. In: Proceedings of the 20th European Conference on Artificial Intelligence (ECAI), pp. 576\u2013581 (2012)"},{"key":"8_CR26","unstructured":"Malialis, K., Devlin, S., Kudenko, D.: Resource abstraction for reinforcement learning in multiagent congestion problems. In: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 503\u2013511 (2016)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-319-71682-4_12","volume-title":"Autonomous Agents and Multiagent Systems","author":"J Marchant","year":"2017","unstructured":"Marchant, J., Griffiths, N.: Convention emergence in partially observable topologies. In: Sukthankar, G., Rodriguez-Aguilar, J.A. (eds.) AAMAS 2017. LNCS (LNAI), vol. 10642, pp. 187\u2013202. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71682-4_12"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1007\/s10458-019-09422-0","volume":"33","author":"A Morris-Martin","year":"2019","unstructured":"Morris-Martin, A., De Vos, M., Padget, J.: Norm emergence in multiagent systems: a viewpoint paper. Auton. Agent Multi-Agent Syst. 33, 706\u2013749 (2019). https:\/\/doi.org\/10.1007\/s10458-019-09422-0","journal-title":"Auton. Agent Multi-Agent Syst."},{"key":"8_CR29","unstructured":"Mukherjee, P., Sen, S., Airiau, S.: Norm emergence under constrained interactions in diverse societies. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 779\u2013786 (2008)"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-540-79003-7_22","volume-title":"Coordination, Organizations, Institutions, and Norms in Agent Systems III","author":"A Perreau de Pinninck","year":"2008","unstructured":"Perreau de Pinninck, A., Sierra, C., Schorlemmer, M.: Distributed norm enforcement via ostracism. In: Sichman, J.S., Padget, J., Ossowski, S., Noriega, P. (eds.) COIN -2007. LNCS (LNAI), vol. 4870, pp. 301\u2013315. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79003-7_22"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"357","DOI":"10.3233\/AIC-2010-0479","volume":"23","author":"N Salazar","year":"2010","unstructured":"Salazar, N., Rodriguez-Aguilar, J.A., Arcos, J.L.: Robust coordination in large convention spaces. AI Commun. 23, 357\u2013371 (2010)","journal-title":"AI Commun."},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-93920-7_2","volume-title":"Declarative Agent Languages and Technologies VI","author":"BTR Savarimuthu","year":"2009","unstructured":"Savarimuthu, B.T.R., Purvis, M., Purvis, M., Cranefield, S.: Social norm emergence in virtual agent societies. In: Baldoni, M., Son, T.C., van Riemsdijk, M.B., Winikoff, M. (eds.) DALT 2008. LNCS (LNAI), vol. 5397, pp. 18\u201328. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-93920-7_2"},{"issue":"1","key":"8_CR33","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1006\/jeth.1997.2347","volume":"78","author":"KH Schlag","year":"1998","unstructured":"Schlag, K.H.: Why imitate, and if so, how?: a boundedly rational approach to multi-armed bandits. J. Econ. Theory 78(1), 130\u2013156 (1998)","journal-title":"J. Econ. Theory"},{"key":"8_CR34","unstructured":"Seldin, Y., Bartlett, P.L., Crammer, K., Abbasi-Yadkori, Y.: Prediction with limited advice and multiarmed bandits with paid observations. In: Proceedings of the 30th International Conference on Machine Learning (ICML), pp. 280\u2013287 (2014)"},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-14962-7_14","volume-title":"Coordination, Organizations, Institutions and Norms in Agent Systems V","author":"O Sen","year":"2010","unstructured":"Sen, O., Sen, S.: Effects of social network topology and options on norm emergence. In: Padget, J., et al. (eds.) COIN -2009. LNCS (LNAI), vol. 6069, pp. 211\u2013222. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14962-7_14"},{"key":"8_CR36","unstructured":"Sen, S., Airiau, S.: Emergence of norms through social learning. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI), pp. 1507\u20131512 (2007)"},{"key":"8_CR37","unstructured":"Shivaswamy, P., Joachims, T.: Multi-armed bandit problems with history. In: Artificial Intelligence and Statistics, pp. 1046\u20131054 (2012)"},{"issue":"1\u20132","key":"8_CR38","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0004-3702(97)00028-3","volume":"94","author":"Y Shoham","year":"1997","unstructured":"Shoham, Y., Tennenholtz, M.: On the emergence of social conventions: modeling, analysis, and simulations. Artif. Intell. 94(1\u20132), 139\u2013166 (1997)","journal-title":"Artif. Intell."},{"key":"8_CR39","unstructured":"Villatoro, D., Sabater-Mir, J., Sen, S.: Social instruments for robust convention emergence. In: Proceedings of the 22th International Joint Conference on Artificial Intelligence (IJCAI), pp. 420\u2013425 (2011)"},{"key":"8_CR40","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-24804-2_12","volume-title":"Advances in Social Computing and Multiagent Systems","author":"GA Vouros","year":"2015","unstructured":"Vouros, G.A.: The emergence of norms via contextual agreements in open societies. In: Koch, F., Guttmann, C., Busquets, D. (eds.) Advances in Social Computing and Multiagent Systems. CCIS, vol. 541, pp. 185\u2013201. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24804-2_12"},{"key":"8_CR41","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF00992698","volume":"8","author":"CJCH Watkins","year":"1992","unstructured":"Watkins, C.J.C.H., Dayan, P.: Q-learning. Mach. Learn. 8, 279\u2013292 (1992). https:\/\/doi.org\/10.1007\/BF00992698","journal-title":"Mach. Learn."},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Yang, A., Yang, G.H.: A contextual bandit approach to dynamic search. In: Proceedings of the ACM International Conference on Theory of Information Retrieval (SIGIR), pp. 301\u2013304 (2017)","DOI":"10.1145\/3121050.3121101"},{"issue":"12","key":"8_CR43","doi-asserted-by":"publisher","first-page":"2342","DOI":"10.1109\/TCYB.2014.2307862","volume":"44","author":"C Yu","year":"2014","unstructured":"Yu, C., Zhang, M., Ren, F.: Collective learning for the emergence of social norms in networked multiagent systems. IEEE Trans. Cybern. 44(12), 2342\u20132355 (2014)","journal-title":"IEEE Trans. Cybern."},{"key":"8_CR44","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/978-3-319-42911-3_68","volume-title":"PRICAI 2016: Trends in Artificial Intelligence","author":"C Yu","year":"2016","unstructured":"Yu, C., Lv, H., Sen, S., Ren, F., Tan, G.: Adaptive learning for efficient emergence of social norms in networked multiagent systems. In: Booth, R., Zhang, M.-L. (eds.) PRICAI 2016. LNCS (LNAI), vol. 9810, pp. 805\u2013818. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42911-3_68"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Zeng, C., Wang, Q., Mokhtari, S., Li, T.: Online context-aware recommendation with time varying multi-armed bandit. In: Proceedings of the 22nd ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 2025\u20132034 (2016)","DOI":"10.1145\/2939672.2939878"}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82254-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T22:49:24Z","timestamp":1672872564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82254-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030822538","9783030822545"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82254-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUMAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Multi-Agent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eumas2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/biu-ai.com\/EUMAS21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}