{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:50:39Z","timestamp":1745473839631,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030994280"},{"type":"electronic","value":"9783030994297"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T00:00:00Z","timestamp":1648512000000},"content-version":"vor","delay-in-days":87,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Semantic clone detection is the process of finding program elements with similar or equal runtime behavior. For example, detecting the semantic equality between the recursive and iterative implementation of the factorial computation. Semantic clone detection is the de facto technical boundary of clone detectors. In recent years, this boundary has been tested using interesting new approaches. This article contributes a semantic clone detection approach that detects clones which have 0\u00a0% syntactic similarity. We present Semantic Clone Detection via Probabilistic Software Modeling (SCD-PSM) as a stable and precise solution to semantic clone detection. PSM builds a probabilistic model of a program that is capable of evaluating and generating runtime data. SCD-PSM leverages this model and its model elements for finding behaviorally equal model elements. This behavioral equality is then generalized to semantic equality of the original program elements. It uses the likelihood between model elements as a distance metric. Then, it employs the likelihood ratio significance test to decide whether this distance is significant, given a pre-specified and controllable false-positive rate. The output of SCD-PSM are pairs of program elements (i.e., methods), their distance, and a decision on whether they are clones or not. SCD-PSM yields excellent results with a Matthews Correlation Coefficient greater than 0.9. These results are obtained on classical semantic clone detection problems such as detecting recursive and iterative versions of an algorithm, but also on complex problems used in coding competitions.<\/jats:p>","DOI":"10.1007\/978-3-030-99429-7_16","type":"book-chapter","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T20:02:48Z","timestamp":1648497768000},"page":"288-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Semantic Clone Detection via Probabilistic Software Modeling"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3810-0475","authenticated-orcid":false,"given":"Hannes","family":"Thaller","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Linsbauer","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Egyed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,29]]},"reference":[{"key":"16_CR1","unstructured":"Arnold, K., Gosling, J., Holmes, D.: The Java Programming Language. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 3rd edn. (2000)"},{"key":"16_CR2","doi-asserted-by":"publisher","unstructured":"Bellon, S., Koschke, R., Antoniol, G., Krinke, J., Merlo, E.: Comparison and Evaluation of Clone Detection Tools. IEEE Transactions on Software Engineering 33(9), 577\u2013591 (2007). https:\/\/doi.org\/10.1109\/TSE.2007.70725","DOI":"10.1109\/TSE.2007.70725"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Boughorbel, S., Jarray, F., El-Anbari, M.: Optimal classifier for imbalanced data using matthews correlation coefficient metric. PloS one 12(6), e0177678 (2017)","DOI":"10.1371\/journal.pone.0177678"},{"key":"16_CR4","doi-asserted-by":"publisher","unstructured":"Chou, A., Yang, J., Chelf, B., Hallem, S., Engler, D.: An empirical study of operating systems errors. ACM SIGOPS Operating Systems Review 35(5), \u00a073 (Dec 2001). https:\/\/doi.org\/10.1145\/502059.502042","DOI":"10.1145\/502059.502042"},{"key":"16_CR5","doi-asserted-by":"publisher","unstructured":"Cordy, J.R., Roy, C.K.: The NiCad Clone Detector. In: 2011 IEEE 19th International Conference on Program Comprehension. p. 219\u2013220 (Jun 2011). https:\/\/doi.org\/10.1109\/ICPC.2011.26","DOI":"10.1109\/ICPC.2011.26"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Deissenboeck, F., Heinemann, L., Hummel, B., Wagner, S.: Challenges of the Dynamic Detection of Functionally Similar Code Fragments. In: 2012 16th European Conference on Software Maintenance and Reengineering. p. 299\u2013308 (Mar 2012). https:\/\/doi.org\/10.1109\/CSMR.2012.38","DOI":"10.1109\/CSMR.2012.38"},{"key":"16_CR7","unstructured":"Dinh, L., Sohl-Dickstein, J., Bengio, S.: Density estimation using Real NVP. arXiv:1605.08803 [cs, stat] (May 2016)"},{"key":"16_CR8","unstructured":"Elva, R., Leavens, G.T.: JSCTracker : A Semantic Clone Detection Tool for Java Code (2012)"},{"key":"16_CR9","unstructured":"Evans, J.D.: Straightforward Statistics for the Behavioral Sciences. Brooks\/Cole Pub. Co, Pacific Grove (1996)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Fan, J., Zhang, C., Zhang, J.: Generalized Likelihood Ratio Statistics and Wilks Phenomenon. The Annals of Statistics 29(1), 153\u2013193 (2001)","DOI":"10.1214\/aos\/996986505"},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Farmahinifarahani, F., Saini, V., Yang, D., Sajnani, H., Lopes, C.V.: On Precision of Code Clone Detection Tools. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). p. 84\u201394 (Feb 2019). https:\/\/doi.org\/10.1109\/SANER.2019.8668015","DOI":"10.1109\/SANER.2019.8668015"},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Fink, G., Bishop, M.: Property-based testing: A new approach to testing for assurance. ACM SIGSOFT Software Engineering Notes 22(4), 74\u201380 (Jul 1997). https:\/\/doi.org\/10.1145\/263244.263267","DOI":"10.1145\/263244.263267"},{"key":"16_CR13","unstructured":"Fowler, M., Beck, K.: Refactoring: Improving the Design of Existing Code. The Addison-Wesley Object Technology Series, Addison-Wesley, Reading, MA (1999)"},{"key":"16_CR14","doi-asserted-by":"publisher","unstructured":"Geiger, R., Fluri, B., Gall, H.C., Pinzger, M.: Relation of Code Clones and Change Couplings. In: Baresi, L., Heckel, R. (eds.) Fundamental Approaches to Software Engineering, vol.\u00a03922, p. 411\u2013425. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11693017_31","DOI":"10.1007\/11693017_31"},{"key":"16_CR15","doi-asserted-by":"publisher","unstructured":"G\u00f6de, N., Koschke, R.: Incremental Clone Detection. In: 2009 13th European Conference on Software Maintenance and Reengineering. p. 219\u2013228 (Mar 2009). https:\/\/doi.org\/10.1109\/CSMR.2009.20","DOI":"10.1109\/CSMR.2009.20"},{"key":"16_CR16","unstructured":"Harris, S.: Simian - Similarity Analyser (2003)"},{"key":"16_CR17","unstructured":"Hunt, A., Thomas, D.: The Pragmatic Programmer: From Journeyman to Master. Addison-Wesley, Reading, Mass (2000)"},{"key":"16_CR18","doi-asserted-by":"publisher","unstructured":"Jiang, L., Su, Z.: Automatic Mining of Functionally Equivalent Code Fragments via Random Testing. In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis. p. 81\u201392. ISSTA \u201909, ACM, New York, NY, USA (2009). https:\/\/doi.org\/10.1145\/1572272.1572283","DOI":"10.1145\/1572272.1572283"},{"key":"16_CR19","doi-asserted-by":"publisher","unstructured":"Juergens, E., Deissenboeck, F., Hummel, B.: Code Similarities Beyond Copy & Paste. In: 2010 14th European Conference on Software Maintenance and Reengineering. p. 78\u201387. IEEE, Madrid (Mar 2010). https:\/\/doi.org\/10.1109\/CSMR.2010.33","DOI":"10.1109\/CSMR.2010.33"},{"key":"16_CR20","doi-asserted-by":"publisher","unstructured":"Kafer, V., Wagner, S., Koschke, R.: Are there functionally similar code clones in practice? In: 2018 IEEE 12th International Workshop on Software Clones (IWSC). p. 2\u20138. IEEE, Campobasso (Mar 2018). https:\/\/doi.org\/10.1109\/IWSC.2018.8327312","DOI":"10.1109\/IWSC.2018.8327312"},{"key":"16_CR21","doi-asserted-by":"publisher","unstructured":"Kapser, C.J., Godfrey, M.W.: \u201cCloning considered harmful\u201d considered harmful: Patterns of cloning in software. Empirical Software Engineering 13(6), 645\u2013692 (Dec 2008). https:\/\/doi.org\/10.1007\/s10664-008-9076-6","DOI":"10.1007\/s10664-008-9076-6"},{"key":"16_CR22","unstructured":"Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques. Adaptive Computation and Machine Learning, MIT Press, Cambridge, MA (2009)"},{"key":"16_CR23","unstructured":"Koschke, R.: Survey of research on software clones. In: Koschke, R., Merlo, E., Walenstein, A. (eds.) Duplication, Redundancy, and Similarity in Software. No. 06301 in Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum f\u00fcr Informatik (IBFI), Schloss Dagstuhl, Germany, Dagstuhl, Germany (2007)"},{"key":"16_CR24","doi-asserted-by":"publisher","unstructured":"Krinke, J.: Identifying Similar Code with Program Dependence Graphs. Proceedings Eighth Working Conference on Reverse Engineering p. 301\u2013309 (2001). https:\/\/doi.org\/10.1109\/WCRE.2001.957835","DOI":"10.1109\/WCRE.2001.957835"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Krinke, J.: Is Cloned Code More Stable than Non-Cloned Code? Proceedings - 8th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2008 p. 57\u201366 (2008). https:\/\/doi.org\/10.1109\/SCAM.2008.14","DOI":"10.1109\/SCAM.2008.14"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Krinke, J.: Is Cloned Code Older than Non-Cloned Code? (2011)","DOI":"10.1145\/1985404.1985410"},{"key":"16_CR27","doi-asserted-by":"publisher","unstructured":"Li, G., Liu, H., Jiang, Y., Jin, J.: Test-Based Clone Detection: An Initial Try on Semantically Equivalent Methods. IEEE Access 6, 77643\u201377655 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2883699","DOI":"10.1109\/ACCESS.2018.2883699"},{"key":"16_CR28","doi-asserted-by":"publisher","unstructured":"Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE Transactions on Software Engineering 32(3), 176\u2013192 (2006). https:\/\/doi.org\/10.1109\/TSE.2006.28","DOI":"10.1109\/TSE.2006.28"},{"key":"16_CR29","unstructured":"Martin, R.C. (ed.): Clean Code: A Handbook of Agile Software Craftsmanship. Prentice Hall, Upper Saddle River, NJ (2009)"},{"key":"16_CR30","doi-asserted-by":"publisher","unstructured":"Massey, F.J.: The Kolmogorov-Smirnov Test for Goodness of Fit. Journal of the American Statistical Association 46(253), 68\u201378 (Mar 1951). https:\/\/doi.org\/10.1080\/01621459.1951.10500769","DOI":"10.1080\/01621459.1951.10500769"},{"key":"16_CR31","doi-asserted-by":"publisher","unstructured":"Mayrand, Leblanc, Merlo: Experiment on the automatic detection of function clones in a software system using metrics. In: Proceedings of International Conference on Software Maintenance ICSM-96. p. 244\u2013253. IEEE, Monterey, CA, USA (1996). https:\/\/doi.org\/10.1109\/ICSM.1996.565012","DOI":"10.1109\/ICSM.1996.565012"},{"key":"16_CR32","doi-asserted-by":"publisher","unstructured":"Monden, A., Nakae, D., Kamiya, T., Sato, S., Matsumoto, K.: Software quality analysis by code clones in industrial legacy software. In: Proceedings Eighth IEEE Symposium on Software Metrics. p. 87\u201394. IEEE Comput. Soc, Ottawa, Ont., Canada (2002). https:\/\/doi.org\/10.1109\/METRIC.2002.1011328","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"16_CR33","unstructured":"PMD: Pmd. PMD (2019)"},{"key":"16_CR34","doi-asserted-by":"publisher","unstructured":"Rattan, D., Bhatia, R., Singh, M.: Software clone detection: A systematic review. Information and Software Technology 55(7), 1165\u20131199 (Jul 2013). https:\/\/doi.org\/10.1016\/j.infsof.2013.01.008","DOI":"10.1016\/j.infsof.2013.01.008"},{"key":"16_CR35","unstructured":"Roy, C.K., Cordy, J.R.: A Survey on Software Clone Detection Research. Queen\u2019s School of Computing TR 115, \u00a0115 (2007)"},{"key":"16_CR36","doi-asserted-by":"publisher","unstructured":"Saini, V., Farmahinifarahani, F., Lu, Y., Baldi, P., Lopes, C.V.: Oreo: Detection of clones in the twilight zone. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC\/FSE 2018. p. 354\u2013365. ACM Press, Lake Buena Vista, FL, USA (2018). https:\/\/doi.org\/10.1145\/3236024.3236026","DOI":"10.1145\/3236024.3236026"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Sajnani, H., Saini, V., Svajlenko, J., Roy, C.K., Lopes, C.V.: Sourcerercc: Scaling code clone detection to big-code. In: Proceedings of the 38th International Conference on Software Engineering. p. 1157\u20131168 (2016)","DOI":"10.1145\/2884781.2884877"},{"key":"16_CR38","doi-asserted-by":"publisher","unstructured":"Su, F.H., Bell, J., Harvey, K., Sethumadhavan, S., Kaiser, G., Jebara, T.: Code relatives: detecting similarly behaving software. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016. ACM Press (2016). https:\/\/doi.org\/10.1145\/2950290.2950321","DOI":"10.1145\/2950290.2950321"},{"key":"16_CR39","doi-asserted-by":"publisher","unstructured":"Svajlenko, J., Roy, C.K.: Evaluating clone detection tools with BigCloneBench. In: 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME). p. 131\u2013140. IEEE, Bremen, Germany (Sep 2015). https:\/\/doi.org\/10.1109\/ICSM.2015.7332459","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"16_CR40","doi-asserted-by":"publisher","unstructured":"Thaller, H., Linsbauer, L., Egyed, A.: Feature Maps: A Comprehensible Software Representation for Design Pattern Detection. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). p. 207\u2013217. IEEE, Hangzhou, China (Feb 2019). https:\/\/doi.org\/10.1109\/SANER.2019.8667978","DOI":"10.1109\/SANER.2019.8667978"},{"key":"16_CR41","doi-asserted-by":"crossref","unstructured":"Thaller, H., Linsbauer, L., Egyed, A.: Towards Semantic Clone Detection via Probabilistic Software Modeling. In: 2020 IEEE 14th International Workshop on Software Clones (IWSC). p. 64\u201369. IEEE (2020)","DOI":"10.1109\/IWSC50091.2020.9047635"},{"key":"16_CR42","doi-asserted-by":"crossref","unstructured":"Thaller, H., Linsbauer, L., Egyed, A., Fischer, S.: Towards Fault Localization via Probabilistic Software Modeling. In: 2020 IEEE 3rd International Workshop on Validation, Analysis, and Evolution of Software Tests (VST). p. 24\u201327. IEEE (2020)","DOI":"10.1109\/VST50071.2020.9051635"},{"key":"16_CR43","unstructured":"Thaller, H., Linsbauer, L., Ramler, R., Egyed, A.: Probabilistic Software Modeling: A Data-driven Paradigm for Software Analysis. arXiv:1912.07936 [cs] (Dec 2019)"},{"key":"16_CR44","doi-asserted-by":"publisher","unstructured":"Thaller, H., Ramler, R., Pichler, J., Egyed, A.: Exploring code clones in programmable logic controller software. In: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). p. 1\u20138. IEEE, Limassol (Sep 2017). https:\/\/doi.org\/10.1109\/ETFA.2017.8247574","DOI":"10.1109\/ETFA.2017.8247574"},{"key":"16_CR45","unstructured":"Van Rossum, G., Drake, F.L.: Python 3 Reference Manual. CreateSpace, Scotts Valley, CA (2009)"},{"key":"16_CR46","doi-asserted-by":"publisher","unstructured":"Wagner, S., Abdulkhaleq, A., Bogicevic, I., Ostberg, J.P., Ramadani, J.: How are functionally similar code clones syntactically different? An empirical study and a benchmark. PeerJ Computer Science 2, \u00a0e49 (Mar 2016). https:\/\/doi.org\/10.7717\/peerj-cs.49","DOI":"10.7717\/peerj-cs.49"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Wang, P., Svajlenko, J., Wu, Y., Xu, Y., Roy, C.K.: Ccaligner: a token based large-gap clone detector. In: Proceedings of the 40th International Conference on Software Engineering. p. 1066\u20131077 (2018)","DOI":"10.1145\/3180155.3180179"},{"key":"16_CR48","doi-asserted-by":"publisher","unstructured":"Wang, W., Li, G., Ma, B., Xia, X., Jin, Z.: Detecting code clones with graph neural network and flow-augmented abstract syntax tree. In: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE (feb 2020). https:\/\/doi.org\/10.1109\/saner48275.2020.9054857","DOI":"10.1109\/saner48275.2020.9054857"},{"key":"16_CR49","doi-asserted-by":"crossref","unstructured":"Wei, H.H., Li, M.: Supervised deep features for software functional clone detection by exploiting lexical and syntactical information in source code. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence. p. 3034\u20133040. IJCAI\u201917, AAAI Press, Melbourne, Australia (Aug 2017)","DOI":"10.24963\/ijcai.2017\/423"},{"key":"16_CR50","doi-asserted-by":"publisher","unstructured":"Zhang, J., Wang, X., Zhang, H., Sun, H., Wang, K., Liu, X.: A novel neural source code representation based on abstract syntax tree (may 2019). https:\/\/doi.org\/10.1109\/ICSE.2019.00086","DOI":"10.1109\/ICSE.2019.00086"},{"key":"16_CR51","doi-asserted-by":"publisher","unstructured":"Zhao, G., Huang, J.: DeepSim: Deep learning code functional similarity. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 141\u2013151. ESEC\/FSE 2018, Association for Computing Machinery, Lake Buena Vista, FL, USA (Oct 2018). https:\/\/doi.org\/10.1145\/3236024.3236068","DOI":"10.1145\/3236024.3236068"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99429-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T20:19:15Z","timestamp":1648498755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99429-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030994280","9783030994297"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99429-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"29 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/etaps.org\/2022\/fase","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}