{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:38:45Z","timestamp":1758703125139,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031059025"},{"type":"electronic","value":"9783031059032"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05903-2_10","type":"book-chapter","created":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T10:04:19Z","timestamp":1652954659000},"page":"139-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Best Practices for Requirements Validation Process"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2163-120X","authenticated-orcid":false,"given":"Sonia R.","family":"Santana","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1388-0337","authenticated-orcid":false,"given":"Leandro R.","family":"Antonelli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9861-987X","authenticated-orcid":false,"given":"Pablo J.","family":"Thomas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,5,20]]},"reference":[{"key":"10_CR1","unstructured":"Laplante, P.A.: Requirements Engineering for Software and Systems. CRC Press, Boca Raton (2019)"},{"key":"10_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-540-92966-6_2","volume-title":"Design Requirements Engineering: A Ten-Year Perspective","author":"BHC Cheng","year":"2009","unstructured":"Cheng, B.H.C., Atlee, J.M.: Current and future research directions in requirements engineering. In: Lyytinen, K., Loucopoulos, P., Mylopoulos, J., Robinson, B. (eds.) Design Requirements Engineering: A Ten-Year Perspective. LNBIP, vol. 14, pp. 11\u201343. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-92966-6_2"},{"key":"10_CR3","unstructured":"Kotonya, G., Sommerville, I.: Requirements Engineering: Processes and Techniques. Wiley, England (1998)"},{"key":"10_CR4","unstructured":"Pfleeger, S.L.: Software Engineering - Theory and Practice. Prentice Hall, Hoboken (1998)"},{"key":"10_CR5","unstructured":"Kotonya, G., Sommerville, I.: Requirements Engineering: Processes and Techniques. Wiley, England (2000)"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Bahill, A.T., Henderson, S.J.: Requirements development, verification, and validation exhibited in famous failures. Syst. Eng. 8, 1\u201314 (2005). https:\/\/doi.org\/10.1002\/sys.20017","DOI":"10.1002\/sys.20017"},{"key":"10_CR7","unstructured":"Loucopoulos, P., Karakostas, V.: System Requirements Engineering, McGraw-Hill, London (1995). ISBN 0-07-707843-8"},{"key":"10_CR8","unstructured":"Santana, S.R., Antonelli, L., Thomas, P.: Evaluaci\u00f3n de metodolog\u00edas para la validaci\u00f3n de requerimientos. In: XXVII Congreso Argentino de Ciencias de la Computaci\u00f3n (CACIC), pp. 419\u2013428 (2021). ISBN 978 -987-633-574-4"},{"key":"10_CR9","unstructured":"Aiza, M.N., Massila, K., Yusof, M.M., Sidek, S.: A review on requirements validation for software development. J. Theor. Appl. Inf. Technol. 96(11) (2018)"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.jss.2006.04.035","volume":"80","author":"A Kokune","year":"2007","unstructured":"Kokune, A., Mizuno, M., Kadoya, K., Yamamoto, S.: FBCM: strategy modeling method for the validation of software requirements. J. Syst. Softw. 80(3), 314\u2013327 (2007)","journal-title":"J. Syst. Softw."},{"issue":"3-4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s10009-007-0035-0","volume":"9","author":"RJ Machado","year":"2007","unstructured":"Machado, R.J., Lassen, K.B., Oliveira, S., Couto, M., Pinto, P.: Requirements validation: execution of UML Models with CPN tools. Int. J. Softw. Tools Technol. Transfer 9(3\u20134), 353\u2013369 (2007). https:\/\/doi.org\/10.1007\/s10009-007-0035-0","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"issue":"3","key":"10_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s11334-008-0062-3","volume":"4","author":"D Li","year":"2008","unstructured":"Li, D., Li, X., Liu, J., Liu, Z.: Validation of requirement models by automatic prototyping. Innov. Syst. Softw. Eng. 4(3), 241\u2013248 (2008)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Cavada, R., et al.: Tonetta: supporting requirements validation: the EuRailCheck tool. In: ASE2009 - 24th IEEE\/ACM International Conference on Automated Software Engineering, pp. 665\u2013667 (2009)","DOI":"10.1109\/ASE.2009.49"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Jureta, I., Mylopoulos, J., Faulkner, S.: Analysis of multi-party agreement in requirements validation. In: 17th IEEE International Requirements Engineering Conference, pp. 57\u201366 (2009)","DOI":"10.1109\/RE.2009.8"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-03240-0_15","volume-title":"Formal Methods for Industrial Critical Systems","author":"A Cimatti","year":"2009","unstructured":"Cimatti, A., Roveri, M., Susi, A., Tonetta, S.: From informal requirements to property-driven formal validation. In: Cofer, D., Fantechi, A. (eds.) FMICS 2008. LNCS, vol. 5596, pp. 166\u2013181. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03240-0_15"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Aceituna, D., Do, H., Lee, E.S.: SQ^(2): an approach to requirements validation with scenario question. In: Asia Pacific Software Engineering Conference, pp. 33\u201342 (2010)","DOI":"10.1109\/APSEC.2010.14"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Kof, L., Gacitua, R., Rouncefield, M., Sawyer, P.: Ontology and model alignment as a means for requirements validation. In: IEEE Fourth International Conference on Semantic Computing, pp. 46\u201351 (2010)","DOI":"10.1109\/ICSC.2010.95"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Sourour, M.D., Zarour, N.: A methodology of collaborative requirements validation in a cooperative environment. In: 10th International Symposium on Programming and Systems, Algiers, Algeria, pp. 140\u2013147 (2011)","DOI":"10.1109\/ISPS.2011.5898877"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J.: Generating essential user interface prototypes to validate requirements. In: 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011), pp. 564\u2013567 (2011)","DOI":"10.1109\/ASE.2011.6100126"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Holtmann, J., Meyer, J., von Detten, M.: Automatic validation and correction of formalized, textual requirements. In: IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops, pp. 486\u2013495 (2011)","DOI":"10.1109\/ICSTW.2011.17"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Aceituna, D., Do, H., Lee, S.W.: Interactive requirements validation for reactive systems through virtual requirements prototype. In: Model-Driven Requirements Engineering Workshop, MoDRE 2011, pp. 1\u201310 (2011)","DOI":"10.1109\/MoDRE.2011.6045361"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Sharma, R., Biswas, K.K.: Using norm analysis patterns for automated requirements validation. In: Second IEEE International Workshop on Requirements Patterns (RePa), pp. 23\u201328 (2012)","DOI":"10.1109\/RePa.2012.6359965"},{"issue":"4","key":"10_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2377656.2377659","volume":"21","author":"A Cimatti","year":"2012","unstructured":"Cimatti, A., Roveri, M., Susi, A., Tonetta, S.: Validation of requirements for hybrid systems. ACM Trans. Softw. Eng. Methodol 21(4), 1\u201334 (2012)","journal-title":"ACM Trans. Softw. Eng. Methodol"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Felderer, M., Beer, A.: Using defect taxonomies for requirements validation in industrial projects. In: 21st IEEE International Requirements Engineering Conference, RE 2013 - Proceedings, pp. 296\u2013301 (2013)","DOI":"10.1109\/RE.2013.6636733"},{"issue":"2\/3","key":"10_CR25","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1504\/IJCAT.2013.054350","volume":"47","author":"V Gaur","year":"2013","unstructured":"Gaur, V., Soni, A.: A fuzzy traceability vector model for requirements validation. Int. J. Comput. Appl. Technol. 47(2\/3), 172\u2013188 (2013)","journal-title":"Int. J. Comput. Appl. Technol."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., In, H.P., Kazman, R.: Customer requirements validation method based on mental models. In: 21st Asia-Pacific Software Engineering Conference, vol. 1, pp. 199\u2013206 (2014)","DOI":"10.1109\/APSEC.2014.39"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Rodrigues, A.: Quality of requirements specifications - a framework for automatic validation of requirements. In: Proceedings of the 16th International Conference on Enterprise Information Systems, pp. 96\u2013107 (2014)","DOI":"10.5220\/0004951900960107"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Nazir, S.: A process improvement in requirement verification and validation using ontology. In: Asia-Pacific World Congress on Computer Science and Engineering, pp. 1\u20138 (2014)","DOI":"10.1109\/APWCCSE.2014.7053837"},{"issue":"4","key":"10_CR29","first-page":"411","volume":"23","author":"S Saito","year":"2015","unstructured":"Saito, S., Hagiwara, J., Yagasaki, T., Natsukawa, K.: ReVAMP: requirements validation approach using models and prototyping, practical cases of requirements engineering in end-user computing. J. Inf. Process. 23(4), 411\u2013419 (2015)","journal-title":"J. Inf. Process."},{"issue":"2","key":"10_CR30","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00766-015-0240-4","volume":"22","author":"N Ali","year":"2015","unstructured":"Ali, N., Lai, R.: A method of software requirements specification and validation for global software development. Requirements Eng. 22(2), 191\u2013214 (2015). https:\/\/doi.org\/10.1007\/s00766-015-0240-4","journal-title":"Requirements Eng."},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.infsof.2015.01.005","volume":"61","author":"S Zafar","year":"2015","unstructured":"Zafar, S., Farooq-Khan, N., Ahmed, M.: Requirements simulation for early validation using behavior trees and Datalog. Inf. Softw. Technol. 61, 52\u201370 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-319-47846-3_3","volume-title":"Formal Methods and Software Engineering","author":"W Miao","year":"2016","unstructured":"Miao, W., et al.: Automated requirements validation for atp software via specification review and testing. In: Ogata, K., Lawford, M., Liu, S. (eds.) ICFEM 2016. LNCS, vol. 10009, pp. 26\u201340. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47846-3_3"},{"key":"10_CR33","first-page":"97","volume":"671","author":"N Yusop","year":"2016","unstructured":"Yusop, N., Kamalrudin, M., Sidek, S., Grundy, J.: Automated support to capture and validate security requirements for mobile apps. Commun. Comput. Inf. Sci. 671, 97\u2013112 (2016)","journal-title":"Commun. Comput. Inf. Sci."},{"issue":"1","key":"10_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00766-014-0208-9","volume":"21","author":"M El-Attar","year":"2014","unstructured":"El-Attar, M., Abdul-Ghani, H.A.: Using security robustness analysis for early-stage validation of functional security requirements. Requirements Eng. 21(1), 1\u201327 (2014). https:\/\/doi.org\/10.1007\/s00766-014-0208-9","journal-title":"Requirements Eng."},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Moketar, A., Kamalrudin, M., Sidek, S., Robinson, M., Grundy, J.: An automated collaborative requirements engineering tool for better validation of requirements (2016)","DOI":"10.1145\/2970276.2970295"},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-319-54045-0_24","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"B Rosadini","year":"2017","unstructured":"Rosadini, B., Ferrari, A., Gori, G., Fantechi, A., Gnesi, S., Trotta, I., Bacherini, S.: Using NLP to detect requirements defects: an industrial experience in the railway domain. In: Gr\u00fcnbacher, P., Perini, A. (eds.) REFSQ 2017. LNCS, vol. 10153, pp. 344\u2013360. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54045-0_24"},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.procir.2017.02.025","volume":"60","author":"C Buchholz","year":"2017","unstructured":"Buchholz, C., Vorsatz, T., Kind, S., Stark, R.: SHPbench - a smart hybrid prototyping based environment for early testing, verification and (user based) validation of advanced driver assistant systems of cars. Procedia CIRP 60, 139\u2013144 (2017)","journal-title":"Procedia CIRP"},{"key":"10_CR38","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jss.2018.07.053","volume":"145","author":"E Stachtiari","year":"2018","unstructured":"Stachtiari, E., Mavridou, A., Katsaros, P., Bliudze, S., Sifakis, J.: Early validation of system requirements and design through correctness-by-construction. J. Syst. Softw. 145, 52\u201378 (2018)","journal-title":"J. Syst. Softw."},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Chahin, A., Paetzold, K.: Planning validation & verification steps according to the dependency of requirements and product architecture. In: IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC), pp. 1\u20136 (2018)","DOI":"10.1109\/ICE.2018.8436250"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Gruber, K., Huemer, J., Zimmermann, A., Maschotta, R.: Automotive requirements validation and traceability analysis with AQL queries. In: IEEE International Systems Engineering Symposium (ISSE), pp. 1\u20137 (2018)","DOI":"10.1109\/SysEng.2018.8544440"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Bayona-Or\u00e9, S., Chamilco, J., Perez, D.: Software process improvement: requirements management, verification and validation. In: 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1\u20135 (2019)","DOI":"10.23919\/CISTI.2019.8760896"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Yang, Y., Ke, W., Li, X.: RM2PT: requirements validation through automatic prototyping. In: IEEE 27th International Requirements Engineering Conference (RE), pp. 484\u2013485 (2019)","DOI":"10.1109\/RE.2019.00067"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Atoum, I.: A scalable operational framework for requirements validation using semantic and functional models. In: Proceedings of the 2nd International Conference on Software Engineering and Information Management (ICSIM 2019), New York, pp. 1\u20136. Association for Computing Machinery (2019)","DOI":"10.1145\/3305160.3305166"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Alshareef, S.F., Maatuk, A.M., Abdelaziz, T.M., Hagal, M.: Validation framework for aspectual requirements engineering (ValFAR). In: Proceedings of the 6th International Conference on Engineering & MIS (ICEMIS\u201920), Article 42, New York, pp. 1\u20137. Association for Computing Machinery (2020)","DOI":"10.1145\/3410352.3410777"},{"key":"10_CR45","first-page":"8697","volume":"8","author":"D Iqbal","year":"2020","unstructured":"Iqbal, D., Abbas, A., Ali, M., Khan, M.U.S., Nawaz, R.: Requirement validation for embedded systems in automotive industry through modeling. IEEE 8, 8697\u20138719 (2020)","journal-title":"IEEE"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Fei, X., Bin, C., Siming, Z.: A methodology of requirements validation for aviation system development. In: Chinese Control and Decision Conference (CCDC), pp. 4484\u20134489 (2020)","DOI":"10.1109\/CCDC49329.2020.9164301"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Mashkoor, A., Leuschel, M., Egyed, A.: Validation obligations: a novel approach to check compliance between requirements and their formal specification (2021)","DOI":"10.1109\/ICSE-NIER52604.2021.00009"},{"key":"10_CR48","unstructured":"Seligmann, P.S., Wijers, G.M., Sol, H.G.: Analyzing the structure of IS methodologies, an alternative approach. In: Proceedings of the First Dutch Conference on Information Systems, Amersfoort, The Netherlands (1989)"},{"key":"10_CR49","unstructured":"Sol, H.G.: A feature analysis of information systems design methodologies: methodological considerations. In: Olle, T.W., Sol, H.G., Tully, C.J. (eds.), Information Systems Design Methodologies: A Feature Analysis. Olle, H.G. Sol, C.J. Tully (eds.), Information Systems Design Methodologies: A Feature Analysis, North-Holland, Amsterdam, The Netherlands (1983)"},{"key":"10_CR50","unstructured":"Kensing, F.: Towards evaluation of methods for property determination. In: Bemelmans, M.A. (ed.) Beyond Productivity: Information Systems Development for Organizational Effectiveness, North-Holland, Amsterdam, The Netherlands, pp.325\u2013338 (1984)"},{"key":"10_CR51","doi-asserted-by":"publisher","unstructured":"Wijers, G.M., Heijes, H.: Automated support of the modelling process: a view based on experiments with expert information engineers. In: Steinholtz, B., S\u00f8lvberg, A., Bergman, L. (eds.) Advanced Information Systems Engineering. CAiSE 1990. Lecture Notes in Computer Science, vol. 436, pp 88\u2013108. Springer, Berlin (1990). https:\/\/doi.org\/10.1007\/BFb0000588","DOI":"10.1007\/BFb0000588"},{"key":"10_CR52","unstructured":"Pressman, S.R.: Software Engineering. A practical approach, 7th edn, Mc Graw Hill, Mexico City (2010)"},{"key":"10_CR53","unstructured":"IEEE Recommended Practice for Software Requirements Specifications, IEEE Std 830-1998 pp.1\u201340 (1998)"},{"key":"10_CR54","doi-asserted-by":"crossref","unstructured":"Martin, J.N.: Overview of the EIA 632 standard: processes for engineering a system. In: 17th DASC. AIAA\/IEEE\/SAE. Digital Avionics Systems Conference. Proceedings (Cat. No. 98CH36267), pp. B32\u20131 (1998)","DOI":"10.1109\/DASC.1998.741462"}],"container-title":["Communications in Computer and Information Science","Computer Science \u2013 CACIC 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05903-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T14:13:42Z","timestamp":1727273622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05903-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031059025","9783031059032"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05903-2_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"20 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CACIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Argentine Congress of Computer Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cacic2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cacic2021.unsa.edu.ar\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"RedUNCI","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"130","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}