{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:28:15Z","timestamp":1763728095799,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030908690"},{"type":"electronic","value":"9783030908706"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90870-6_18","type":"book-chapter","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:06:44Z","timestamp":1636502804000},"page":"330-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Gaussian Process-Based Confidence Estimation for Hybrid System Falsification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3854-9846","authenticated-orcid":false,"given":"Zhenya","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6253-4062","authenticated-orcid":false,"given":"Paolo","family":"Arcaini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,10]]},"reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-319-63387-9_24","volume-title":"Computer Aided Verification","author":"A Adimoolam","year":"2017","unstructured":"Adimoolam, A., Dang, T., Donz\u00e9, A., Kapinski, J., Jin, X.: Classification and coverage-based falsification for embedded control systems. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 483\u2013503. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_24"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-319-46982-9_27","volume-title":"Runtime Verification","author":"T Akazaki","year":"2016","unstructured":"Akazaki, T.: Falsification of conditional safety properties for cyber-physical systems with Gaussian process regression. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 439\u2013446. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_27"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-19835-9_21","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Y Annpureddy","year":"2011","unstructured":"Annpureddy, Y., Liu, C., Fainekos, G., Sankaranarayanan, S.: S-TaLiRo: a tool for temporal logic falsification for hybrid systems. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 254\u2013257. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19835-9_21"},{"key":"18_CR4","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking (Representation and Mind Series). The MIT Press (2008)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Balesdent, M., Morio, J., Marzat, J.: Kriging-based adaptive importance sampling algorithms for rare event estimation. Struct. Saf. 44, 1\u201310 (2013)","DOI":"10.1016\/j.strusafe.2013.04.001"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Botev, Z.: The normal law under linear restrictions: simulation and estimation via minimax tilting. J. Roy. Stat. Soc. Ser. B (Stat. Methodol.) 1(79), 125\u2013148 (2017)","DOI":"10.1111\/rssb.12162"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Broyden, C.G.: A class of methods for solving nonlinear simultaneous equations. Math. Comput. 19(92), 577\u2013593 (1965)","DOI":"10.1090\/S0025-5718-1965-0198670-6"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Corso, A., Moss, R.J., Koren, M., Lee, R., Kochenderfer, M.J.: A survey of algorithms for black-box safety validation. arXiv preprint arXiv:2005.02979 (2020)","DOI":"10.1613\/jair.1.12716"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Deshmukh, J., Horvat, M., Jin, X., Majumdar, R., Prabhu, V.S.: Testing cyber-physical systems through Bayesian optimization. ACM Trans. Embed. Comput. Syst. 16(5s) (2017). https:\/\/doi.org\/10.1145\/3126521","DOI":"10.1145\/3126521"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-319-24953-7_35","volume-title":"Automated Technology for Verification and Analysis","author":"J Deshmukh","year":"2015","unstructured":"Deshmukh, J., Jin, X., Kapinski, J., Maler, O.: Stochastic local search for falsification of hybrid systems. In: Finkbeiner, B., Pu, G., Zhang, L. (eds.) ATVA 2015. LNCS, vol. 9364, pp. 500\u2013517. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24953-7_35"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Dokhanchi, A., et al.: ARCH-COMP18 category report: results on the falsification benchmarks. In: 5th International Workshop on Applied Verification of Continuous and Hybrid Systems, ARCH18. EPiC Series in Computing, vol. 54, pp. 104\u2013109. EasyChair (2018). https:\/\/doi.org\/10.29007\/t85q","DOI":"10.29007\/t85q"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Dokhanchi, A., Zutshi, A., Sriniva, R.T., Sankaranarayanan, S., Fainekos, G.: Requirements driven falsification with coverage metrics. In: Proceedings of the 12th International Conference on Embedded Software, EMSOFT 2015, pp. 31\u201340. IEEE Press (2015)","DOI":"10.1109\/EMSOFT.2015.7318257"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-14295-6_17","volume-title":"Computer Aided Verification","author":"A Donz\u00e9","year":"2010","unstructured":"Donz\u00e9, A.: Breach, a toolbox for verification and parameter synthesis of hybrid systems. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 167\u2013170. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_17"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-15297-9_9","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"A Donz\u00e9","year":"2010","unstructured":"Donz\u00e9, A., Maler, O.: Robust satisfaction of temporal logic over real-valued signals. In: Chatterjee, K., Henzinger, T.A. (eds.) FORMATS 2010. LNCS, vol. 6246, pp. 92\u2013106. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15297-9_9"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-17524-9_10","volume-title":"NASA Formal Methods","author":"T Dreossi","year":"2015","unstructured":"Dreossi, T., Dang, T., Donz\u00e9, A., Kapinski, J., Jin, X., Deshmukh, J.V.: Efficient guiding strategies for testing of temporal properties of hybrid systems. In: Havelund, K., Holzmann, G., Joshi, R. (eds.) NFM 2015. LNCS, vol. 9058, pp. 127\u2013142. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17524-9_10"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Ernst, G., et al.: ARCH-COMP 2020 category report: falsification. In: 7th International Workshop on Applied Verification of Continuous and Hybrid Systems (ARCH20), ARCH20. EPiC Series in Computing, vol. 74, pp. 140\u2013152. EasyChair (2020). https:\/\/doi.org\/10.29007\/trr1","DOI":"10.29007\/trr1"},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"Ernst, G., et al.: ARCH-COMP 2019 category report: falsification. In: 6th International Workshop on Applied Verification of Continuous and Hybrid Systems, ARCH19. EPiC Series in Computing, vol. 61, pp. 129\u2013140. EasyChair (2019). https:\/\/doi.org\/10.29007\/68dk","DOI":"10.29007\/68dk"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-030-30281-8_10","volume-title":"Quantitative Evaluation of Systems","author":"G Ernst","year":"2019","unstructured":"Ernst, G., Sedwards, S., Zhang, Z., Hasuo, I.: Fast falsification of hybrid systems using probabilistically adaptive input. In: Parker, D., Wolf, V. (eds.) QEST 2019. LNCS, vol. 11785, pp. 165\u2013181. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30281-8_10"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Fainekos, G.E., Pappas, G.J.: Robustness of temporal logic specifications for continuous-time signals. Theor. Comput. Sci. 410(42), 4262\u20134291 (2009). https:\/\/doi.org\/10.1016\/j.tcs.2009.06.021","DOI":"10.1016\/j.tcs.2009.06.021"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Feldt, R., Poulding, S.: Broadening the search in search-based software testing: it need not be evolutionary. In: Proceedings of the Eighth International Workshop on Search-Based Software Testing, SBST 2015, pp. 1\u20137. IEEE Press (2015)","DOI":"10.1109\/SBST.2015.8"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-540-74833-5_23","volume-title":"Next Generation Teletraffic and Wired\/Wireless Advanced Networking","author":"S Giordano","year":"2007","unstructured":"Giordano, S., Gubinelli, M., Pagano, M.: Rare events of gaussian processes: a performance comparison between bridge Monte-Carlo and importance sampling. In: Koucheryavy, Y., Harju, J., Sayenko, A. (eds.) NEW2AN 2007. LNCS, vol. 4712, pp. 269\u2013280. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74833-5_23"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Gladisch, C., Heinz, T., Heinzemann, C., Oehlerking, J., von Vietinghoff, A., Pfitzer, T.: Experience paper: search-based testing in automated driving control applications. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering. ASE 2019, pp. 26\u201337. IEEE Press (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00013","DOI":"10.1109\/ASE.2019.00013"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Hansen, N., M\u00fcller, S.D., Koumoutsakos, P.: Reducing the time complexity of the derandomized evolution strategy with covariance matrix adaptation (CMA-ES). Evol. Comput. 11(1), 1\u201318 (2003)","DOI":"10.1162\/106365603321828970"},{"key":"18_CR24","doi-asserted-by":"publisher","unstructured":"Harper, A.J.: Bounds on the suprema of Gaussian processes, and omega results for the sum of a random multiplicative function. Ann. Appl. Probab.23(2), 584\u2013616 (2013). https:\/\/doi.org\/10.1214\/12-AAP847","DOI":"10.1214\/12-AAP847"},{"key":"18_CR25","unstructured":"Hoxha, B., Abbas, H., Fainekos, G.E.: Benchmarks for temporal logic requirements for automotive systems. In: 1st and 2nd International Workshop on Applied veRification for Continuous and Hybrid Systems, ARCH@CPSWeek 2014, Berlin, Germany, 14 April 2014 \/ ARCH@CPSWeek 2015, Seattle, USA, April 13, 2015. EPiC Series in Computing, vol. 34, pp. 25\u201330. EasyChair (2014)"},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Jin, X., Deshmukh, J.V., Kapinski, J., Ueda, K., Butts, K.: Powertrain control verification benchmark. In: Proceedings of the 17th International Conference on Hybrid Systems: Computation and Control, HSCC 2014, pp. 253\u2013262. ACM (2014). https:\/\/doi.org\/10.1145\/2562059.2562140","DOI":"10.1145\/2562059.2562140"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Li, W.V., Shao, Q.M., et al.: Lower tail probabilities for gaussian processes. Ann. Probab. 32(1A), 216\u2013242 (2004)","DOI":"10.1214\/aop\/1078415834"},{"key":"18_CR28","unstructured":"Marcus, M.B., Shepp, L.A., et al.: Sample behavior of gaussian processes. In: Proceedings of the Sixth Berkeley Symposium on Mathematical Statistics and Probability, Volume 2: Probability Theory. The Regents of the University of California (1972)"},{"key":"18_CR29","doi-asserted-by":"publisher","unstructured":"Menghi, C., Nejati, S., Briand, L., Parache, Y.I.: Approximation-refinement testing of compute-intensive cyber-physical models: an approach based on system identification. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering. ICSE 2020, pp. 372\u2013384. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3377811.3380370","DOI":"10.1145\/3377811.3380370"},{"key":"18_CR30","doi-asserted-by":"publisher","unstructured":"Nejati, S., Gaaloul, K., Menghi, C., Briand, L.C., Foster, S., Wolfe, D.: Evaluating model testing and model checking for finding requirements violations in Simulink models. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ESEC\/FSE 2019, pp. 1015\u20131025. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3338906.3340444","DOI":"10.1145\/3338906.3340444"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Rasmussen, C.E., Williams, C.K., Bach, F.: Gaussian Processes for Machine Learning. MIT Press (2006)","DOI":"10.7551\/mitpress\/3206.001.0001"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-66845-1_1","volume-title":"Integrated Formal Methods","author":"S Silvetti","year":"2017","unstructured":"Silvetti, S., Policriti, A., Bortolussi, L.: An active learning approach to the falsification of black box cyber-physical systems. In: Polikarpova, N., Schneider, S. (eds.) IFM 2017. LNCS, vol. 10510, pp. 3\u201317. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66845-1_1"},{"key":"18_CR33","doi-asserted-by":"publisher","unstructured":"Yamagata, Y., Liu, S., Akazaki, T., Duan, Y., Hao, J.: Falsification of cyber-physical systems using deep reinforcement learning. IEEE Trans. Softw. Eng. (2020). https:\/\/doi.org\/10.1109\/TSE.2020.2969178","DOI":"10.1109\/TSE.2020.2969178"},{"key":"18_CR34","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-030-10928-8_17","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"A Zanette","year":"2019","unstructured":"Zanette, A., Zhang, J., Kochenderfer, M.J.: Robust super-level set estimation using Gaussian processes. In: Berlingerio, M., Bonchi, F., G\u00e4rtner, T., Hurley, N., Ifrim, G. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11052, pp. 276\u2013291. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10928-8_17"},{"key":"18_CR35","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Arcaini, P., Hasuo, I.: Hybrid system falsification under (in)equality constraints via search space transformation. IEEE Trans. Comput.-Aided Des. Integrated Circuits Syst. 39(11), 3674\u20133685 (2020). https:\/\/doi.org\/10.1109\/TCAD.2020.3013073","DOI":"10.1109\/TCAD.2020.3013073"},{"key":"18_CR36","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Ernst, G., Sedwards, S., Arcaini, P., Hasuo, I.: Two-layered falsification of hybrid systems guided by Monte Carlo Tree Search. IEEE Trans. Comput.-Aided Des. Integrated Circuits Syst. 37(11), 2894\u20132905 (Nov 2018). https:\/\/doi.org\/10.1109\/TCAD.2018.2858463","DOI":"10.1109\/TCAD.2018.2858463"},{"key":"18_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-030-25540-4_23","volume-title":"Computer Aided Verification","author":"Z Zhang","year":"2019","unstructured":"Zhang, Z., Hasuo, I., Arcaini, P.: Multi-armed bandits for Boolean connectives in hybrid system falsification. In: Dillig, I., Tasiran, S. (eds.) CAV 2019. LNCS, vol. 11561, pp. 401\u2013420. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25540-4_23"},{"key":"18_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-030-81685-8_29","volume-title":"Computer Aided Verification","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., Lyu, D., Arcaini, P., Ma, L., Hasuo, I., Zhao, J.: Effective hybrid system falsification using Monte Carlo tree search guided by QB-robustness. In: Silva, A., Leino, K.R.M. (eds.) CAV 2021. LNCS, vol. 12759, pp. 595\u2013618. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81685-8_29"},{"key":"18_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-030-76384-8_24","volume-title":"NASA Formal Methods","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., Lyu, D., Arcaini, P., Ma, L., Hasuo, I., Zhao, J.: On the effectiveness of signal rescaling in hybrid system falsification. In: Dutle, A., Moscato, M.M., Titolo, L., Mu\u00f1oz, C.A., Perez, I. (eds.) NFM 2021. LNCS, vol. 12673, pp. 392\u2013399. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-76384-8_24"}],"container-title":["Lecture Notes in Computer Science","Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90870-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:10:13Z","timestamp":1636503013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90870-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030908690","9783030908706"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90870-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/formalmethods2021.csp.escience.cn\/dct\/page\/1","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Additionally, this includes 4 invited full papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}