{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:48:15Z","timestamp":1760042895467,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031086786"},{"type":"electronic","value":"9783031086793"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08679-3_9","type":"book-chapter","created":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T13:05:13Z","timestamp":1654952713000},"page":"131-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Traits: Correctness-by-Construction for\u00a0Free"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Runge","sequence":"first","affiliation":[]},{"given":"Alex","family":"Potanin","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Th\u00fcm","sequence":"additional","affiliation":[]},{"given":"Ina","family":"Schaefer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,12]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abrial, J.: Modeling in Event-B - System and Software Engineering. Cambridge University Press (2010)","DOI":"10.1017\/CBO9781139195881"},{"issue":"6","key":"9_CR2","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s10009-010-0145-y","volume":"12","author":"JR Abrial","year":"2010","unstructured":"Abrial, J.R., Butler, M., Hallerstede, S., Hoang, T.S., Mehta, F., Voisin, L.: Rodin: an open toolset for modelling and reasoning in event-B. STTT 12(6), 447\u2013466 (2010)","journal-title":"STTT"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Ahrendt, W., Beckert, B., Bubel, R., H\u00e4hnle, R., Schmitt, P.H., Ulbrich, M.: Deductive Software Verification-The KeY Book: From Theory to Practice, vol. 10001. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49812-6","DOI":"10.1007\/978-3-319-49812-6"},{"issue":"3","key":"9_CR4","first-page":"227","volume":"21","author":"RJ Back","year":"2009","unstructured":"Back, R.J.: Invariant based programming: basic approach and teaching experiences. FAOC 21(3), 227\u2013244 (2009)","journal-title":"FAOC"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-73770-4_4","volume-title":"Tests and Proofs","author":"R-J Back","year":"2007","unstructured":"Back, R.-J., Eriksson, J., Myreen, M.: Testing and verifying invariant based programs in the SOCOS environment. In: Gurevich, Y., Meyer, B. (eds.) TAP 2007. LNCS, vol. 4454, pp. 61\u201378. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73770-4_4"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Back, R.J., Wright, J.: Refinement Calculus: A Systematic Introduction. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4612-1674-2","DOI":"10.1007\/978-1-4612-1674-2"},{"issue":"6","key":"9_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1953122.1953145","volume":"54","author":"M Barnett","year":"2011","unstructured":"Barnett, M., F\u00e4hndrich, M., Leino, K.R.M., M\u00fcller, P., Schulte, W., Venter, H.: Specification and verification: the spec# experience. Commun. ACM 54(6), 81\u201391 (2011)","journal-title":"Commun. ACM"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-30569-9_3","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"M Barnett","year":"2005","unstructured":"Barnett, M., Leino, K.R.M., Schulte, W.: The Spec# programming system: an overview. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol. 3362, pp. 49\u201369. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30569-9_3"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-030-03418-4_21","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Modeling","author":"MH ter Beek","year":"2018","unstructured":"ter Beek, M.H., Cleophas, L., Schaefer, I., Watson, B.W.: X-by-construction. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 359\u2013364. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03418-4_21"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Bettini, L., Damiani, F., Schaefer, I.: Implementing software product lines using traits. In: SAC, pp. 2096\u20132102 (2010)","DOI":"10.1145\/1774088.1774530"},{"issue":"5","key":"9_CR11","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.scico.2011.06.007","volume":"78","author":"L Bettini","year":"2013","unstructured":"Bettini, L., Damiani, F., Schaefer, I., Strocco, F.: TRAITRECORDJ: a programming language with traits and records. Sci. Comput. Program. 78(5), 521\u2013541 (2013)","journal-title":"Sci. Comput. Program."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Bono, V., Mensa, E., Naddeo, M.: Trait-oriented programming in Java 8. In: PPPJ, pp. 181\u2013186 (2014)","DOI":"10.1145\/2647508.2647520"},{"key":"9_CR13","unstructured":"Chapman, R.: Correctness by construction: a manifesto for high integrity software. In: SCS, pp. 43\u201346 (2006)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Chen, H.Y., David, C., Kroening, D., Schrammel, P., Wachter, B.: Synthesising interprocedural bit-precise termination proofs (t). In: ASE, pp. 53\u201364 (2015)","DOI":"10.1109\/ASE.2015.10"},{"key":"9_CR15","unstructured":"Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. Addison-Wesley (2002)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-03359-9_2","volume-title":"Theorem Proving in Higher Order Logics","author":"E Cohen","year":"2009","unstructured":"Cohen, E., et al.: VCC: a practical system for verifying concurrent C. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 23\u201342. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03359-9_2"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-642-20398-5_35","volume-title":"NASA Formal Methods","author":"DR Cok","year":"2011","unstructured":"Cok, D.R.: OpenJML: JML for Java 7 by extending OpenJDK. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 472\u2013479. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_35"},{"issue":"4","key":"9_CR18","first-page":"761","volume":"26","author":"F Damiani","year":"2014","unstructured":"Damiani, F., Dovland, J., Johnsen, E.B., Schaefer, I.: Verifying traits: an incremental proof system for fine-grained reuse. FAOC 26(4), 761\u2013793 (2014)","journal-title":"FAOC"},{"key":"9_CR19","unstructured":"Dijkstra, E.W.: A Discipline of Programming. Prentice Hall (1976)"},{"issue":"2","key":"9_CR20","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1145\/1119479.1119483","volume":"28","author":"S Ducasse","year":"2006","unstructured":"Ducasse, S., Nierstrasz, O., Sch\u00e4rli, N., Wuyts, R., Black, A.P.: Traits: a mechanism for fine-grained reuse. TOPLAS 28(2), 331\u2013388 (2006)","journal-title":"TOPLAS"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and Mixins. In: POPL, pp. 171\u2013183 (1998)","DOI":"10.1145\/268946.268961"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Gries, D.: The Science of Programming. Springer, New York (1987). https:\/\/doi.org\/10.1007\/978-1-4612-5983-1","DOI":"10.1007\/978-1-4612-5983-1"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-39634-2_10","volume-title":"Interactive Theorem Proving","author":"F Haftmann","year":"2013","unstructured":"Haftmann, F., Krauss, A., Kun\u010dar, O., Nipkow, T.: Data refinement in Isabelle\/HOL. In: Blazy, S., Paulin-Mohring, C., Pichardie, D. (eds.) ITP 2013. LNCS, vol. 7998, pp. 100\u2013115. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39634-2_10"},{"issue":"1","key":"9_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/52.976937","volume":"19","author":"A Hall","year":"2002","unstructured":"Hall, A., Chapman, R.: Correctness by construction: developing a commercial secure system. Softw. IEEE 19(1), 18\u201325 (2002)","journal-title":"Softw. IEEE"},{"issue":"1","key":"9_CR25","first-page":"41","volume":"12","author":"RJ Hall","year":"2005","unstructured":"Hall, R.J.: Fundamental nonmodularity in electronic mail. ASE 12(1), 41\u201379 (2005)","journal-title":"ASE"},{"key":"9_CR26","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/BFb0059696","volume-title":"Symposium on Semantics of Algorithmic Languages","author":"CAR Hoare","year":"1971","unstructured":"Hoare, C.A.R.: Procedures and parameters: an axiomatic approach. In: Engeler, E. (ed.) Symposium on Semantics of Algorithmic Languages. LNM, vol. 188, pp. 102\u2013116. Springer, Heidelberg (1971). https:\/\/doi.org\/10.1007\/BFb0059696"},{"issue":"3","key":"9_CR27","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1145\/503502.503505","volume":"23","author":"A Igarashi","year":"2001","unstructured":"Igarashi, A., Pierce, B.C., Wadler, P.: Featherweight Java: a minimal core calculus for Java and GJ. TOPLAS 23(3), 396\u2013450 (2001)","journal-title":"TOPLAS"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-17164-2_21","volume-title":"Programming Languages and Systems","author":"B Jacobs","year":"2010","unstructured":"Jacobs, B., Smans, J., Piessens, F.: A quick tour of the VeriFast program verifier. In: Ueda, K. (ed.) APLAS 2010. LNCS, vol. 6461, pp. 304\u2013311. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17164-2_21"},{"key":"9_CR29","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-319-70578-1_4","volume-title":"Proceedings of 5th International Conference in Software Engineering for Defence Applications","author":"M Khazeev","year":"2018","unstructured":"Khazeev, M., Rivera, V., Mazzara, M., Johard, L.: Initial steps towards assessing the usability of a verification tool. In: Ciancarini, P., Litvinov, S., Messina, A., Sillitti, A., Succi, G. (eds.) SEDA 2016. AISC, vol. 717, pp. 31\u201340. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-70578-1_4"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Kourie, D.G., Watson, B.W.: The Correctness-by-Construction Approach to Programming. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27919-5","DOI":"10.1007\/978-3-642-27919-5"},{"key":"9_CR31","unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: JML: a Java modeling language. In: Formal Underpinnings of Java Workshop (at OOPSLA 1998), pp. 404\u2013420. Citeseer (1998)"},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-17511-4_20","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"KRM Leino","year":"2010","unstructured":"Leino, K.R.M.: Dafny: an automatic program verifier for functional correctness. In: Clarke, E.M., Voronkov, A. (eds.) LPAR 2010. LNCS (LNAI), vol. 6355, pp. 348\u2013370. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17511-4_20"},{"issue":"2","key":"9_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330017.1330022","volume":"30","author":"L Liquori","year":"2008","unstructured":"Liquori, L., Spiwack, A.: FeatherTrait: a modest extension of featherweight Java. TOPLAS 30(2), 1\u201332 (2008)","journal-title":"TOPLAS"},{"issue":"6","key":"9_CR34","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1145\/197320.197383","volume":"16","author":"BH Liskov","year":"1994","unstructured":"Liskov, B.H., Wing, J.M.: A behavioral notion of subtyping. TOPLAS 16(6), 1811\u20131841 (1994)","journal-title":"TOPLAS"},{"issue":"3","key":"9_CR35","first-page":"199","volume":"8","author":"B Meyer","year":"1988","unstructured":"Meyer, B.: Eiffel: a language and environment for software engineering. JSS 8(3), 199\u2013246 (1988)","journal-title":"JSS"},{"issue":"10","key":"9_CR36","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201cDesign by Contract\u2019\u2019. Computer 25(10), 40\u201351 (1992)","journal-title":"Computer"},{"key":"9_CR37","unstructured":"Morgan, C.: Programming from Specifications, 2nd edn. Prentice Hall (1994)"},{"issue":"1","key":"9_CR38","first-page":"28","volume":"15","author":"MVM Oliveira","year":"2003","unstructured":"Oliveira, M.V.M., Cavalcanti, A., Woodcock, J.: ArcAngel: a tactic language for refinement. FAOC 15(1), 28\u201347 (2003)","journal-title":"FAOC"},{"issue":"1","key":"9_CR39","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/S0167-6423(00)00018-6","volume":"41","author":"M Plath","year":"2001","unstructured":"Plath, M., Ryan, M.: Feature integration using a feature construct. Sci. Comput. Program. 41(1), 53\u201384 (2001)","journal-title":"Sci. Comput. Program."},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Reb\u00ealo, H., et al.: AspectJML: modular specification and runtime checking for crosscutting contracts. In: MODULARITY, pp. 157\u2013168. ACM, New York (2014)","DOI":"10.1145\/2577080.2577084"},{"key":"9_CR41","unstructured":"Runge, T., Potanin, A., Th\u00fcm, T., Schaefer, I.: Traits for correct-by-construction programming (2022). https:\/\/arxiv.org\/abs\/2204.05644"},{"key":"9_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-030-16722-6_2","volume-title":"Fundamental Approaches to Software Engineering","author":"T Runge","year":"2019","unstructured":"Runge, T., Schaefer, I., Cleophas, L., Th\u00fcm, T., Kourie, D., Watson, B.W.: Tool support for correctness-by-construction. In: H\u00e4hnle, R., van der Aalst, W. (eds.) FASE 2019. LNCS, vol. 11424, pp. 25\u201342. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16722-6_2"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Scholz, W., Th\u00fcm, T., Apel, S., Lengauer, C.: Automatic detection of feature interactions using the Java modeling language: an experience report. In: SPLC. ACM, New York (2011)","DOI":"10.1145\/2019136.2019144"},{"key":"9_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-34188-5_15","volume-title":"Hardware and Software: Verification and Testing","author":"O Sery","year":"2012","unstructured":"Sery, O., Fedyukovich, G., Sharygina, N.: Interpolation-based function summaries in bounded model checking. In: Eder, K., Louren\u00e7o, J., Shehory, O. (eds.) HVC 2011. LNCS, vol. 7261, pp. 160\u2013175. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34188-5_15"},{"key":"9_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/11531142_20","volume-title":"ECOOP 2005 - Object-Oriented Programming","author":"C Smith","year":"2005","unstructured":"Smith, C., Drossopoulou, S.: Chai: traits for Java-like languages. In: Black, A.P. (ed.) ECOOP 2005. LNCS, vol. 3586, pp. 453\u2013478. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11531142_20"},{"key":"9_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-71067-7_23","volume-title":"Theorem Proving in Higher Order Logics","author":"M Sozeau","year":"2008","unstructured":"Sozeau, M., Oury, N.: First-class type classes. In: Mohamed, O.A., Mu\u00f1oz, C., Tahar, S. (eds.) TPHOLs 2008. LNCS, vol. 5170, pp. 278\u2013293. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71067-7_23"},{"key":"9_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-030-30942-8_20","volume-title":"Formal Methods \u2013 The Next 30 Years","author":"D Steinh\u00f6fel","year":"2019","unstructured":"Steinh\u00f6fel, D., H\u00e4hnle, R.: Abstract execution. In: ter Beek, M.H., McIver, A., Oliveira, J.N. (eds.) FM 2019. LNCS, vol. 11800, pp. 319\u2013336. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30942-8_20"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Th\u00fcm, T., Schaefer, I., Apel, S., Hentschel, M.: Family-based deductive verification of software product lines. In: GPCE, pp. 11\u201320. ACM (2012)","DOI":"10.1145\/2371401.2371404"},{"key":"9_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/978-3-662-46681-0_53","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J Tschannen","year":"2015","unstructured":"Tschannen, J., Furia, C.A., Nordio, M., Polikarpova, N.: AutoProof: auto-active functional verification of object-oriented programs. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 566\u2013580. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_53"},{"key":"9_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1007\/978-3-319-47166-2_52","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"BW Watson","year":"2016","unstructured":"Watson, B.W., Kourie, D.G., Schaefer, I., Cleophas, L.: Correctness-by-construction and post-hoc verification: a marriage of convenience? In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 730\u2013748. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47166-2_52"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08679-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T13:06:14Z","timestamp":1654952774000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08679-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031086786","9783031086793"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08679-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FORTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Techniques for Distributed Objects, Components, and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lucca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"42","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"forte2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}