{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:32:24Z","timestamp":1776335544979,"version":"3.51.2"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030971236","type":"print"},{"value":"9783030971243","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97124-3_21","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:16:56Z","timestamp":1648646216000},"page":"236-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Engineering Ecosystem Models: Semantics and\u00a0Pragmatics"],"prefix":"10.1007","author":[{"given":"Tristan","family":"Caulfield","sequence":"first","affiliation":[]},{"given":"Marius-Constantin","family":"Ilau","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Alvarez, C., Casallas, R.: MTC flow: a tool to design, develop and deploy model transformation chains. In: Proceedings of the Workshop on ACadeMics Tooling with Eclipse, ACME \u201913, New York, NY, USA. Association for Computing Machinery (2013)","DOI":"10.1145\/2491279.2491286"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.tcs.2015.11.035","volume":"614","author":"G Anderson","year":"2016","unstructured":"Anderson, G., Pym, D.: A calculus and logic of bunched resources and processes. Theoret. Comput. Sci. 614, 63\u201396 (2016)","journal-title":"Theoret. Comput. Sci."},{"key":"21_CR3","unstructured":"Anonymous authors. Modelling Organizational Recovery (2021, Submitted)"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-1-4614-1981-5_10","volume-title":"Economics of Information Security and Privacy III","author":"A Baldwin","year":"2013","unstructured":"Baldwin, A., Beres, Y., Duggan, G.B., Mont, M.C., Johnson, H., Middup, C., Shiu, S.: Economic methods and decision making by security professionals. In: Schneier, B. (ed.) Economics of Information Security and Privacy III, pp. 213\u2013238. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_10"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Beres, Y., Griffin, J., Shiu, S., Heitman, M., Markle, D., Ventura, P.: Analysing the performance of security solutions to reduce vulnerability exposure window. In: 2008 Annual Computer Security Applications Conference (ACSAC), pp. 33\u201342 (2008)","DOI":"10.1109\/ACSAC.2008.42"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Beresnevichiene, Y., Pym, D., Shiu, S.: Decision support for systems security investment. In: 2010 IEEE\/IFIP Network Operations and Management Symposium Workshops, pp. 118\u2013125 (2010)","DOI":"10.1109\/NOMSW.2010.5486590"},{"key":"21_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-03840-4","volume-title":"Demos - Discrete Event Modelling on Simula","author":"G Birtwistle","year":"1979","unstructured":"Birtwistle, G.: Demos - Discrete Event Modelling on Simula. Macmillan, Basingstoke (1979)"},{"key":"21_CR8","unstructured":"Caulfield, T.: SysModels Julia Package. https:\/\/github.com\/tristanc\/SysModels. Accessed 10 May 2021"},{"issue":"5","key":"21_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2015.97","volume":"13","author":"T Caulfield","year":"2015","unstructured":"Caulfield, T., Pym, D.: Improving security policy decisions with models. IEEE Secur. Priv. 13(5), 34\u201341 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Caulfield, T., Pym, D.: Modelling and simulating systems security policy. In: Proceedings of SimuTools (2015)","DOI":"10.4108\/eai.24-8-2015.2260765"},{"issue":"1","key":"21_CR11","first-page":"37","volume":"1","author":"T Caulfield","year":"2015","unstructured":"Caulfield, T., Fielder, A.: Optimizing time allocation for network defence. J. Cybersecur. 1(1), 37\u201351 (2015)","journal-title":"J. Cybersecur."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Caulfield, T., Parkin, S.: Case study: predicting the impact of a physical access control intervention. In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pp. 37\u201346 (2016)","DOI":"10.1145\/3046055.3046056"},{"issue":"1","key":"21_CR13","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/S0167-6423(02)00030-8","volume":"44","author":"S Clarke","year":"2002","unstructured":"Clarke, S.: Extending standard UML with model composition semantics. Sci. Comput. Program. 44(1), 71\u2013100 (2002). Special Issue on Unified Modeling Language (UML 2000)","journal-title":"Sci. Comput. Program."},{"key":"21_CR14","volume-title":"A Discipline of Math. Systems Modelling","author":"M Collinson","year":"2012","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Math. Systems Modelling. College Publns., Rickmansworth (2012)"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1017\/S0960129509990077","volume":"19","author":"M Collinson","year":"2009","unstructured":"Collinson, M., Pym, D.: Algebra and logic for resource-based systems modelling. Math. Struct. Comput. Sci. 19, 959\u20131027 (2009)","journal-title":"Math. Struct. Comput. Sci."},{"key":"21_CR16","volume-title":"Distributed Systems: Concepts and Design","author":"G Coulouris","year":"2000","unstructured":"Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design, 3rd edn. Addison Wesley, Boston (2000)","edition":"3"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/0304-3975(85)90093-3","volume":"37","author":"R de Simone","year":"1985","unstructured":"de Simone, R.: Higher-level synchronising devices in Meije-SCCS. Theor. Comput. Sci. 37, 245\u2013267 (1985)","journal-title":"Theor. Comput. Sci."},{"key":"21_CR18","unstructured":"Facebook. Open-sourcing Facebook Infer. https:\/\/engineering.fb.com\/2015\/06\/11\/developer-tools\/open-sourcing-facebook-infer-identify-bugs-before-you-ship\/. Accessed 10 May 2021"},{"issue":"5","key":"21_CR19","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00236-017-0302-9","volume":"55","author":"E Fares","year":"2017","unstructured":"Fares, E., Bodeveix, J.-P., Filali, M.: Event algebra for transition systems composition application to timed automata. Acta Informatica 55(5), 363\u2013400 (2017). https:\/\/doi.org\/10.1007\/s00236-017-0302-9","journal-title":"Acta Informatica"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1017\/S0960129505004858","volume":"15","author":"D Galmiche","year":"2005","unstructured":"Galmiche, D., M\u00e9ry, D., Pym, D.: The semantics of BI and resource Tableaux. Math. Struct. Comput. Sci. 15, 1033\u20131088 (2005)","journal-title":"Math. Struct. Comput. Sci."},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-10003-2_79","volume-title":"Automata, Languages and Programming","author":"M Hennessy","year":"1980","unstructured":"Hennessy, M., Milner, R.: On observing nondeterminism and concurrency. In: de Bakker, J., van Leeuwen, J. (eds.) ICALP 1980. LNCS, vol. 85, pp. 299\u2013309. Springer, Heidelberg (1980). https:\/\/doi.org\/10.1007\/3-540-10003-2_79"},{"key":"21_CR22","unstructured":"Hewlett-Packard Laboratories. Security Analytics. https:\/\/www.hpl.hp.com\/news\/2011\/oct-dec\/security_analytics.html. Accessed 10 May 2021"},{"key":"21_CR23","volume-title":"Communicating Sequential Processes","author":"CAR Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall International, London (1985)"},{"issue":"2","key":"21_CR24","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ejor.2011.05.050","volume":"216","author":"C Ioannidis","year":"2011","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Information security trade-offs and optimal patching policies. Eur. J. Oper. Res. 216(2), 434\u2013444 (2011). https:\/\/doi.org\/10.1016\/j.ejor.2011.05.050","journal-title":"Eur. J. Oper. Res."},{"key":"21_CR25","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-1-4614-1981-5_8","volume-title":"Economics of Information Security and Privacy III","author":"C Ioannidis","year":"2013","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Fixed costs, investment rigidities, and risk aversion in information security: a utility-theoretic approach. In: Schneier, B. (ed.) Economics of Information Security and Privacy III, pp. 171\u2013191. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_8"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Ishtiaq, S.S., O\u2019Hearn, P.: BI as an assertion language for mutable data structures. In: Proceedings of POPL (2001)","DOI":"10.1145\/360204.375719"},{"issue":"2","key":"21_CR27","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/505145.505149","volume":"11","author":"D Jackson","year":"2002","unstructured":"Jackson, D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. 11(2), 256\u2013290 (2002)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"21_CR28","unstructured":"julia. http:\/\/julialang.org"},{"key":"21_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/11787044_14","volume-title":"Model Driven Architecture \u2013 Foundations and Applications","author":"A Kleppe","year":"2006","unstructured":"Kleppe, A.: MCC: a model transformation environment. In: Rensink, A., Warmer, J. (eds.) ECMDA-FA 2006. LNCS, vol. 4066, pp. 173\u2013187. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787044_14"},{"key":"21_CR30","first-page":"219","volume":"2","author":"NA Lynch","year":"1989","unstructured":"Lynch, N.A., Tuttle, M.R.: An introduction to input\/output automata. CWI Q. 2, 219\u2013246 (1989)","journal-title":"CWI Q."},{"issue":"2","key":"21_CR31","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s10270-013-0348-2","volume":"14","author":"Q Ma","year":"2015","unstructured":"Ma, Q., Kelsen, P., Glodt, C.: A generic model decomposition technique and its application to the eclipse modeling framework. Softw. Syst. Model. 14(2), 921\u2013952 (2015). https:\/\/doi.org\/10.1007\/s10270-013-0348-2","journal-title":"Softw. Syst. Model."},{"key":"21_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-10235-3","volume-title":"A Calculus of Communicating Systems","author":"R Milner","year":"1980","unstructured":"Milner, R.: A Calculus of Communicating Systems, vol. 92. Springer, Heidelberg (1980). https:\/\/doi.org\/10.1007\/3-540-10235-3"},{"issue":"3","key":"21_CR33","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0304-3975(83)90114-7","volume":"25","author":"R Milner","year":"1983","unstructured":"Milner, R.: Calculi for synchrony and asynchrony. Theor. Comput. Sci. 25(3), 267\u2013310 (1983)","journal-title":"Theor. Comput. Sci."},{"key":"21_CR34","volume-title":"Communication and Concurrency","author":"R Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice Hall, New York (1989)"},{"key":"21_CR35","volume-title":"Communicating and Mobile Systems: The $$\\pi $$-Calculus","author":"R Milner","year":"1999","unstructured":"Milner, R.: Communicating and Mobile Systems: The $$\\pi $$-Calculus. Cambridge University Press, Cambridge (1999)"},{"key":"21_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/3-540-45832-8_3","volume-title":"Graph Transformation","author":"R Milner","year":"2002","unstructured":"Milner, R.: Bigraphs as a model for mobile interaction. In: Corradini, A., Ehrig, H., Kreowski, H.-J., Rozenberg, G. (eds.) ICGT 2002. LNCS, vol. 2505, pp. 8\u201313. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45832-8_3"},{"key":"21_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626661","volume-title":"The Space and Motion of Communicating Agents","author":"R Milner","year":"2009","unstructured":"Milner, R.: The Space and Motion of Communicating Agents. Cambridge University Press, Cambridge (2009)"},{"issue":"1\u20133","key":"21_CR38","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.tcs.2006.12.035","volume":"375","author":"P O\u2019Hearn","year":"2007","unstructured":"O\u2019Hearn, P.: Resources, concurrency, and local reasoning. Theor. Comput. Sci. 375(1\u20133), 271\u2013307 (2007)","journal-title":"Theor. Comput. Sci."},{"key":"21_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44802-0_1","volume-title":"Computer Science Logic","author":"P O\u2019Hearn","year":"2001","unstructured":"O\u2019Hearn, P., Reynolds, J., Yang, H.: Local reasoning about programs that alter data structures. In: Fribourg, L. (ed.) CSL 2001. LNCS, vol. 2142, pp. 1\u201319. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44802-0_1"},{"issue":"2","key":"21_CR40","doi-asserted-by":"publisher","first-page":"215","DOI":"10.2307\/421090","volume":"5","author":"PW O\u2019Hearn","year":"1999","unstructured":"O\u2019Hearn, P.W., Pym, D.J.: The logic of bunched implications. Bull. Symb. Logic 5(2), 215\u2013244 (1999)","journal-title":"Bull. Symb. Logic"},{"key":"21_CR41","unstructured":"Plotkin, G.D.: A structural approach to operational semantics. Technical Report DAIMI FN-19, Computer Science Dept., Aarhus University, Aarhus, Denmark (1981)"},{"issue":"2","key":"21_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3326938.3326940","volume":"6","author":"D Pym","year":"2019","unstructured":"Pym, D.: Resource semantics: logic as a modelling technology. ACM SIGLOG News 6(2), 5\u201341 (2019)","journal-title":"ACM SIGLOG News"},{"issue":"1","key":"21_CR43","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.tcs.2003.11.020","volume":"315","author":"DJ Pym","year":"2004","unstructured":"Pym, D.J., O\u2019Hearn, P.W., Yang, H.: Possible worlds and resources: the semantics of BI. Theor. Comput. Sci. 315(1), 257\u2013305 (2004)","journal-title":"Theor. Comput. Sci."},{"key":"21_CR44","unstructured":"Reynolds, J.: Separation logic: a logic for shared mutable data structures. In: Proceedings of LICS (2002)"},{"key":"21_CR45","unstructured":"Reynolds, J.C.: Separation logic: a logic for shared mutable data structures. In: Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science, LICS \u201902, Washington, DC, USA, pp. 55\u201374. IEEE Computer Society (2002)"},{"key":"21_CR46","volume-title":"Unified Modeling Language Reference Manual","author":"J Rumbaugh","year":"2004","unstructured":"Rumbaugh, J., Jacobson, I., Booch, G.: Unified Modeling Language Reference Manual, 2nd edn. Pearson Higher Education, Hoboken (2004)","edition":"2"},{"key":"21_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3550-5","volume-title":"Modal and Temporal Properties of Processes","author":"C Stirling","year":"2001","unstructured":"Stirling, C.: Modal and Temporal Properties of Processes. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/978-1-4757-3550-5"},{"key":"21_CR48","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511974533","volume-title":"Logical Dynamics of Information and Interaction","author":"J van Benthem","year":"2011","unstructured":"van Benthem, J.: Logical Dynamics of Information and Interaction. Cambridge University Press, Cambridge (2011)"},{"key":"21_CR49","volume-title":"Logic and Structure","author":"D van Dalen","year":"1997","unstructured":"van Dalen, D.: Logic and Structure, 3rd edn. Springer, Heidelberg (1997)","edition":"3"},{"key":"21_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-75209-7_3","volume-title":"Model Driven Engineering Languages and Systems","author":"B Vanhooff","year":"2007","unstructured":"Vanhooff, B., Ayed, D., Van Baelen, S., Joosen, W., Berbers, Y.: UniTI: a unified transformation infrastructure. In: Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS 2007. LNCS, vol. 4735, pp. 31\u201345. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75209-7_3"},{"key":"21_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-45931-6_28","volume-title":"Foundations of Software Science and Computation Structures","author":"H Yang","year":"2002","unstructured":"Yang, H., O\u2019Hearn, P.: A semantic basis for local reasoning. In: Nielsen, M., Engberg, U. (eds.) FoSSaCS 2002. LNCS, vol. 2303, pp. 402\u2013416. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45931-6_28"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97124-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:48:24Z","timestamp":1648648104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97124-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030971236","9783030971243"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97124-3_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/simutools.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}