{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:40:36Z","timestamp":1742971236614,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030995263"},{"type":"electronic","value":"9783030995270"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Debugging imperative network programs is a difficult task for operators as it requires understanding various network modules and complicated data structures. For this purpose, this paper presents an automated technique for repairing network programs with respect to unit tests. Given as input a faulty network program and a set of unit tests, our approach localizes the fault through symbolic reasoning, and synthesizes a patch ensuring that the repaired program passes all unit tests. It applies domain-specific abstraction to simplify network data structures and exploits function summary reuse for modular symbolic analysis. We have implemented the proposed techniques in a tool called <jats:sc>NetRep<\/jats:sc> and evaluated it on 10 benchmarks adapted from real-world software-defined network controllers. The evaluation results demonstrate the effectiveness and efficiency of <jats:sc>NetRep<\/jats:sc> for repairing network programs.<\/jats:p>","DOI":"10.1007\/978-3-030-99527-0_19","type":"book-chapter","created":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T06:37:21Z","timestamp":1648535841000},"page":"353-372","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Repair for Network Programs"],"prefix":"10.1007","author":[{"given":"Lei","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yuepeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rajeev","family":"Alur","sequence":"additional","affiliation":[]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,30]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., van Gemund, A.J.C.: Spectrum-based multiple fault localization. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE). pp. 88\u201399. IEEE Computer Society (2009)","DOI":"10.1109\/ASE.2009.25"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., van Gemund, A.J.: On the accuracy of spectrum-based fault localization. In: Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION. pp. 89\u201398 (2007)","DOI":"10.1109\/TAICPART.2007.4344104"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Ball, T., Bj\u00f8rner, N., Gember, A., Itzhaky, S., Karbyshev, A., Sagiv, M., Schapira, M., Valadarsky, A.: Vericon: towards verifying controller programs in software-defined networks. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). pp. 282\u2013293. ACM (2014)","DOI":"10.1145\/2666356.2594317"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Beckett, R., Gupta, A., Mahajan, R., Walker, D.: A general approach to network configuration verification. In: Proceedings of the Conference of the ACM Special Interest Group on Data Communication. pp. 155\u2013168 (2017)","DOI":"10.1145\/3098822.3098834"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Chen, L., Pei, Y., Furia, C.A.: Contract-based program repair without the contracts. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE). pp. 637\u2013647. IEEE Computer Society (2017)","DOI":"10.1109\/ASE.2017.8115674"},{"key":"19_CR6","unstructured":"Chen, M.Y., Kiciman, E., Fratkin, E., Fox, A., Brewer, E.A.: Pinpoint: Problem determination in large, dynamic internet services. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN). pp. 595\u2013604. IEEE Computer Society (2002)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Dallmeier, V., Lindig, C., Zeller, A.: Lightweight defect localization for java. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP). Lecture Notes in Computer Science, vol.\u00a03586, pp. 528\u2013550. Springer (2005)","DOI":"10.1007\/11531142_23"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Fedyukovich, G., Ahmad, M.B.S., Bod\u00edk, R.: Gradual synthesis for static parallelization of single-pass array-processing programs. In: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2017, Barcelona, Spain, June 18-23, 2017. pp. 572\u2013585. ACM (2017)","DOI":"10.1145\/3062341.3062382"},{"key":"19_CR9","unstructured":"Floodlight: https:\/\/github.com\/floodlight\/floodlight (2021)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Galenson, J., Reames, P., Bod\u00edk, R., Hartmann, B., Sen, K.: Codehint: dynamic and interactive synthesis of code snippets. In: Jalote, P., Briand, L.C., van\u00a0der Hoek, A. (eds.) Proceedings of the International Conference on Software Engineering (ICSE). pp. 653\u2013663. ACM (2014)","DOI":"10.1145\/2568225.2568250"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Goues, C.L., Pradel, M., Roychoudhury, A.: Automated program repair. Commun. ACM 62(12), 56\u201365 (2019)","DOI":"10.1145\/3318162"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Griesmayer, A., Bloem, R., Cook, B.: Repair of boolean programs with an application to c. In: International Conference on Computer Aided Verification. pp. 358\u2013371. Springer (2006)","DOI":"10.1007\/11817963_33"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Gulwani, S.: Automating string processing in spreadsheets using input-output examples. In: Ball, T., Sagiv, M. (eds.) Proceedings of the ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). pp. 317\u2013330. ACM (2011)","DOI":"10.1145\/1925844.1926423"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Gulwani, S., Radicek, I., Zuleger, F.: Automated clustering and program repair for introductory programming assignments. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). pp. 465\u2013480. ACM (2018)","DOI":"10.1145\/3296979.3192387"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Gupta, R., Pal, S., Kanade, A., Shevade, S.K.: Deepfix: Fixing common C language errors by deep learning. In: Singh, S.P., Markovitch, S. (eds.) Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence. pp. 1345\u20131351. AAAI Press (2017)","DOI":"10.1609\/aaai.v31i1.10742"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Harman, M.: Automated patching techniques: the fix is in: technical perspective. Commun. ACM 53(5), \u00a0108 (2010)","DOI":"10.1145\/1735223.1735248"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Hojjat, H., R\u00fcmmer, P., McClurg, J., Cern\u00fd, P., Foster, N.: Optimizing horn solvers for network repair. In: Piskac, R., Talupur, M. (eds.) Proceedings of the Formal Methods in Computer-Aided Design (FMCAD). pp. 73\u201380. IEEE (2016)","DOI":"10.1109\/FMCAD.2016.7886663"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Hong, S., Lee, J., Lee, J., Oh, H.: SAVER: scalable, precise, and safe memory-error repair. In: Proceedings of the International Conference on Software Engineering (ICSE). pp. 271\u2013283. ACM (2020)","DOI":"10.1145\/3377811.3380323"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J., Stasko, J.T.: Visualization of test information to assist fault localization. In: Proceedings of the 24th International Conference on Software Engineering, ICSE 2002, 19-25 May 2002, Orlando, Florida, USA. pp. 467\u2013477. ACM (2002)","DOI":"10.1145\/581339.581397"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Jose, M., Majumdar, R.: Bug-assist: Assisting fault localization in ANSI-C programs. In: Proceedings of International Conference on Computer Aided Verification (CAV). LNCS, vol.\u00a06806, pp. 504\u2013509. Springer (2011)","DOI":"10.1007\/978-3-642-22110-1_40"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Jose, M., Majumdar, R.: Cause clue clauses: error localization using maximum satisfiability. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). pp. 437\u2013446. ACM (2011)","DOI":"10.1145\/1993316.1993550"},{"key":"19_CR22","unstructured":"Kazemian, P., Varghese, G., McKeown, N.: Header space analysis: Static checking for networks. In: 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). pp. 113\u2013126 (2012)"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Khurshid, A., Zou, X., Zhou, W., Caesar, M., Godfrey, P.B.: Veriflow: Verifying network-wide invariants in real time. In: Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). pp. 15\u201327. USENIX Association (2013)","DOI":"10.1145\/2342441.2342452"},{"key":"19_CR24","unstructured":"Kim, H., Reich, J., Gupta, A., Shahbaz, M., Feamster, N., Clark, R.J.: Kinetic: Verifiable dynamic network control. In: Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). pp. 59\u201372. USENIX Association (2015)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Kneuss, E., Koukoutos, M., Kuncak, V.: Deductive program repair. In: International Conference on Computer Aided Verification. pp. 217\u2013233. Springer (2015)","DOI":"10.1007\/978-3-319-21668-3_13"},{"key":"19_CR26","unstructured":"Lam, P., Bodden, E., Lhot\u00e1k, O., Hendren, L.: The soot framework for java program analysis: a retrospective. In: Cetus Users and Compiler Infrastructure Workshop. vol.\u00a015 (2011)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Le, X.D., Chu, D., Lo, D., Goues, C.L., Visser, W.: S3: syntax- and semantic-guided repair synthesis via programming by examples. In: Bodden, E., Sch\u00e4fer, W., van Deursen, A., Zisman, A. (eds.) Proceedings of the Joint Meeting on Foundations of Software Engineering, (ESEC\/FSE). pp. 593\u2013604. ACM (2017)","DOI":"10.1145\/3106237.3106309"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Li, G., Liu, H., Chen, X., Gunawi, H.S., Lu, S.: Dfix: automatically fixing timing bugs in distributed systems. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). pp. 994\u20131009. ACM (2019)","DOI":"10.1145\/3314221.3314620"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Li, X., Li, W., Zhang, Y., Zhang, L.: Deepfl: integrating multiple fault diagnosis dimensions for deep fault localization. In: Zhang, D., M\u00f8ller, A. (eds.) Proceedings of the SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). pp. 169\u2013180. ACM (2019)","DOI":"10.1145\/3293882.3330574"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S., Nguyen, T.N.: Dlfix: context-based code transformation learning for automated program repair. In: Proceedings of International Conference on Software Engineering (ICSE). pp. 602\u2013614. ACM (2020)","DOI":"10.1145\/3377811.3380345"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Long, F., Rinard, M.: Staged program repair with condition synthesis. In: Proceedings of the Joint Meeting on Foundations of Software Engineering (ESEC\/FSE). pp. 166\u2013178. ACM (2015)","DOI":"10.1145\/2786805.2786811"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Long, F., Rinard, M.: Automatic patch generation by learning correct code. In: Proceedings of the Symposium on Principles of Programming Languages (POPL). pp. 298\u2013312. ACM (2016)","DOI":"10.1145\/2914770.2837617"},{"key":"19_CR33","unstructured":"Lopes, N.P., Bj\u00f8rner, N., Godefroid, P., Jayaraman, K., Varghese, G.: Checking beliefs in dynamic networks. In: Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). pp. 499\u2013512. USENIX Association (2015)"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Marginean, A., Bader, J., Chandra, S., Harman, M., Jia, Y., Mao, K., Mols, A., Scott, A.: Sapfix: automated end-to-end repair at scale. In: Proceedings of the International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP). pp. 269\u2013278. IEEE \/ ACM (2019)","DOI":"10.1109\/ICSE-SEIP.2019.00039"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"McClurg, J., Hojjat, H., Cern\u00fd, P.: Synchronization synthesis for network programs. In: Majumdar, R., Kuncak, V. (eds.) Proceedings of the International conference on Computer Aided Verification (CAV). Lecture Notes in Computer Science, vol. 10427, pp. 301\u2013321. Springer (2017)","DOI":"10.1007\/978-3-319-63390-9_16"},{"key":"19_CR36","doi-asserted-by":"crossref","unstructured":"McClurg, J., Hojjat, H., Cern\u00fd, P., Foster, N.: Efficient synthesis of network updates. In: Grove, D., Blackburn, S.M. (eds.) Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). pp. 196\u2013207. ACM (2015)","DOI":"10.1145\/2813885.2737980"},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Mechtaev, S., Yi, J., Roychoudhury, A.: Angelix: scalable multiline program patch synthesis via symbolic analysis. In: Proceedings of the International Conference on Software Engineering (ICSE). pp. 691\u2013701. ACM (2016)","DOI":"10.1145\/2884781.2884807"},{"key":"19_CR38","doi-asserted-by":"crossref","unstructured":"Padon, O., Immerman, N., Karbyshev, A., Lahav, O., Sagiv, M., Shoham, S.: Decentralizing SDN policies. In: Proceedings of the ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). pp. 663\u2013676. ACM (2015)","DOI":"10.1145\/2775051.2676990"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Perry, D.M., Kim, D., Samanta, R., Zhang, X.: Semcluster: clustering of imperative programming assignments based on quantitative semantic features. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). pp. 860\u2013873. ACM (2019)","DOI":"10.1145\/3314221.3314629"},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Polozov, O., Gulwani, S.: Flashmeta: a framework for inductive program synthesis. In: Aldrich, J., Eugster, P. (eds.) Proceedings of theACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (OOPSLA). pp. 107\u2013126. ACM (2015)","DOI":"10.1145\/2814270.2814310"},{"key":"19_CR41","doi-asserted-by":"crossref","unstructured":"Pradel, M., Sen, K.: Deepbugs: a learning approach to name-based bug detection. Proc. ACM Program. Lang. 2(OOPSLA), 147:1\u2013147:25 (2018)","DOI":"10.1145\/3276517"},{"key":"19_CR42","doi-asserted-by":"crossref","unstructured":"Raychev, V., Sch\u00e4fer, M., Sridharan, M., Vechev, M.T.: Refactoring with synthesis. In: Hosking, A.L., Eugster, P.T., Lopes, C.V. (eds.) Proceedings of the ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, (OOPSLA). pp. 339\u2013354. ACM (2013)","DOI":"10.1145\/2509136.2509544"},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Raychev, V., Vechev, M.T., Yahav, E.: Code completion with statistical language models. In: O\u2019Boyle, M.F.P., Pingali, K. (eds.) Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). pp. 419\u2013428. ACM (2014)","DOI":"10.1145\/2666356.2594321"},{"key":"19_CR44","unstructured":"Renieris, M., Reiss, S.P.: Fault localization with nearest neighbor queries. In: Proceedings of the IEEE International Conference on Automated Software Engineering (ASE). pp. 30\u201339. IEEE Computer Society (2003)"},{"key":"19_CR45","doi-asserted-by":"crossref","unstructured":"Sakkas, G., Endres, M., Cosman, B., Weimer, W., Jhala, R.: Type error feedback via analytic program repair. In: Proceedings of the International Conference on Programming Language Design and Implementation (PLDI). pp. 16\u201330. ACM (2020)","DOI":"10.1145\/3395640"},{"key":"19_CR46","unstructured":"Shi, L., Wang, Y., Alur, R., Loo, B.T.: NetRep: Automatic repair for network programs. https:\/\/arxiv.org\/abs\/2110.06303 (2021)"},{"key":"19_CR47","doi-asserted-by":"crossref","unstructured":"Sidiroglou-Douskos, S., Lahtinen, E., Long, F., Rinard, M.: Automatic error elimination by horizontal code transfer across multiple applications. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). pp. 43\u201354. ACM (2015)","DOI":"10.1145\/2813885.2737988"},{"key":"19_CR48","doi-asserted-by":"crossref","unstructured":"Torlak, E., Bod\u00edk, R.: A lightweight symbolic virtual machine for solver-aided host languages. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). pp. 530\u2013541. ACM (2014)","DOI":"10.1145\/2666356.2594340"},{"key":"19_CR49","doi-asserted-by":"crossref","unstructured":"Wang, K., Singh, R., Su, Z.: Search, align, and repair: data-driven feedback generation for introductory programming exercises. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI). pp. 481\u2013495. ACM (2018)","DOI":"10.1145\/3296979.3192384"},{"key":"19_CR50","doi-asserted-by":"crossref","unstructured":"Wu, Y., Chen, A., Haeberlen, A., Zhou, W., Loo, B.T.: Automated network repair with meta provenance. In: Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets). pp. 26:1\u201326:7. ACM (2015)","DOI":"10.1145\/2834050.2834112"},{"key":"19_CR51","unstructured":"Wu, Y., Chen, A., Haeberlen, A., Zhou, W., Loo, B.T.: Automated bug removal for software-defined networks. In: Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). pp. 719\u2013733. USENIX Association (2017)"},{"key":"19_CR52","doi-asserted-by":"crossref","unstructured":"Xiong, Y., Wang, J., Yan, R., Zhang, J., Han, S., Huang, G., Zhang, L.: Precise condition synthesis for program repair. In: Proceedings of the International Conference on Software Engineering (ICSE). pp. 416\u2013426. IEEE \/ ACM (2017)","DOI":"10.1109\/ICSE.2017.45"},{"key":"19_CR53","doi-asserted-by":"crossref","unstructured":"Xuan, J., Monperrus, M.: Learning to combine multiple ranking metrics for fault localization. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). pp. 191\u2013200. IEEE Computer Society (2014)","DOI":"10.1109\/ICSME.2014.41"},{"key":"19_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Lei, Y., Tan, Q., Mao, X., Zeng, P., Chang, X.: Deep learning-based fault localization with contextual information. IEICE Trans. Inf. Syst. 100-D(12), 3027\u20133031 (2017)","DOI":"10.1587\/transinf.2017EDL8143"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99527-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:49:22Z","timestamp":1710233362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99527-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030995263","9783030995270"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99527-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TACAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tacas2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/etaps.org\/2022\/tacas","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16 tool papers of the affiliated competition SV-Comp and 1 paper consisting of the competition report are also included in the proceedings","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}