{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:58:19Z","timestamp":1743011899832,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031281235"},{"type":"electronic","value":"9783031281242"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28124-2_11","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"107-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Equipment Health Assessment Based\u00a0on\u00a0Node Embedding"],"prefix":"10.1007","author":[{"given":"Jian","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shiqi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haolei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ress.2014.09.014","volume":"133","author":"D An","year":"2015","unstructured":"An, D., Kim, N.H., Choi, J.H.: Practical options for selecting data-driven or physics-based prognostics algorithms with reviews. Reliab. Eng. Sys. Saf. 133, 223\u2013236 (2015)","journal-title":"Reliab. Eng. Sys. Saf."},{"key":"11_CR2","unstructured":"Awate, S.P.: Adaptive, nonparametric Markov models and information-theoretic methods for image restoration and segmentation. Ph.D. thesis, School of Computing, University of Utah (2006)"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10845-013-0774-6","volume":"26","author":"T Benkedjouh","year":"2015","unstructured":"Benkedjouh, T., Medjaher, K., Zerhouni, N., Rechak, S.: Health assessment and life prediction of cutting tools based on support vector regression. J. Intell. Manuf. 26(2), 213\u2013223 (2015)","journal-title":"J. Intell. Manuf."},{"key":"11_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107919","volume":"216","author":"C Chen","year":"2021","unstructured":"Chen, C., Liu, Y., Sun, X., Di Cairano-Gilfedder, C., Titmus, S.: An integrated deep learning-based approach for automobile maintenance prediction with gis data. Reliab. Eng. Syst. Saf. 216, 107919 (2021)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Clifton, D.A., Clifton, L.A., Bannister, P.R., Tarassenko, L.: Automated novelty detection in industrial systems. In: Advances of Computational Intelligence in Industrial Systems, pp. 269\u2013296. Springer, Berlin (2008). https:\/\/doi.org\/10.1007\/978-3-540-78297-1_13","DOI":"10.1007\/978-3-540-78297-1_13"},{"issue":"12","key":"11_CR6","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.2514\/1.J051268","volume":"49","author":"A Coppe","year":"2011","unstructured":"Coppe, A., Haftka, R.T., Kim, N.H.: Uncertainty Identification of Damage Growth Parameters Using Nonlinear Regression. AIAA J. 49(12), 2818\u20132821 (2011). https:\/\/doi.org\/10.2514\/1.J051268","journal-title":"AIAA J."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Fu, H., Liu, Y.: A deep learning-based approach for electrical equipment remaining useful life prediction. Auton. Intell. Syst. 2(1), 1\u201312 (2022)","DOI":"10.1007\/s43684-022-00034-2"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity Conference (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2017.12.033","volume":"83","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M., Liu, M., Xiong, Z.: In-memory big data analytics under space constraints using dynamic programming. Fut. Gen. Comput. Syst. 83, 219\u2013227 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.12.033","journal-title":"Fut. Gen. Comput. Syst."},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Gai, K., Zhang, Y., Qiu, M., Thuraisingham, B.: Blockchain-enabled service optimizations in supply chain digital twin. IEEE Trans. Serv. Comput , Early Access 1\u201312 (2022). https:\/\/doi.org\/10.1109\/TSC.2022.3192166","DOI":"10.1109\/TSC.2022.3192166"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Gai, K., et al.: Electronic health record error prevention approach using ontology in big data. In: IEEE 17th HPCC (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.168"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1007\/978-3-031-10989-8_56","volume-title":"Knowledge Science, Engineering and Management: 15th International Conference, KSEM 2022, Singapore, August 6\u20138, 2022, Proceedings, Part III","author":"X Gao","year":"2022","unstructured":"Gao, X., Qiu, M.: Energy-based learning for\u00a0preventing backdoor attack. In: Memmi, G., Yang, B., Kong, L., Zhang, T., Qiu, M. (eds.) Knowledge Science, Engineering and Management: 15th International Conference, KSEM 2022, Singapore, August 6\u20138, 2022, Proceedings, Part III, pp. 706\u2013721. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-10989-8_56"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/TIM.2010.2047662","volume":"60","author":"HM Hashemian","year":"2011","unstructured":"Hashemian, H.M.: State-of-the-art predictive maintenance techniques. IEEE Trans. Instrum. Meas. 60(1), 226\u2013236 (2011). https:\/\/doi.org\/10.1109\/TIM.2010.2047662","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Jia, Z., Xiao, Z., Shi, Y.: Remaining useful life prediction of equipment based on xgboost. In: The 5th International Conference on Computer Science and Application Engineering. pp. 1\u20136 (2021)","DOI":"10.1145\/3487075.3487134"},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Li, J., Ming, Z., Qiu, M., Quan, G., Qin, Xiao, C.: Tianzhou: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Archi. 57(9), 840\u2013849 (2011). https:\/\/doi.org\/10.1016\/j.sysarc.2011.03.005","DOI":"10.1016\/j.sysarc.2011.03.005"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multim. Comput. Commun. Appl. 12(4s), 1\u201318 (2016). https:\/\/doi.org\/10.1145\/2978575","DOI":"10.1145\/2978575"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"49557","DOI":"10.1109\/ACCESS.2021.3069256","volume":"9","author":"C Liu","year":"2021","unstructured":"Liu, C., Tang, D., Zhu, H., Nie, Q.: A novel predictive maintenance method based on deep adversarial learning in the intelligent manufacturing system. IEEE Access 9, 49557\u201349575 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3069256","journal-title":"IEEE Access"},{"key":"11_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107646","volume":"214","author":"J Liu","year":"2021","unstructured":"Liu, J., Pan, C., Lei, F., Hu, D., Zuo, H.: Fault prediction of bearings based on LSTM and statistical process analysis. Reliab Eng. Syst. Saf. 214, 107646 (2021)","journal-title":"Reliab Eng. Syst. Saf."},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.ymssp.2012.05.004","volume":"32","author":"Q Liu","year":"2012","unstructured":"Liu, Q., Dong, M., Peng, Y.: A novel method for online health prognosis of equipment based on hidden semi-markov model using sequential monte carlo methods. Mech. Syst. Signal Process. 32, 331\u2013348 (2012)","journal-title":"Mech. Syst. Signal Process."},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TIM.2010.2078296","volume":"60","author":"A Malhi","year":"2011","unstructured":"Malhi, A., Yan, R., Gao, R.X.: Prognosis of defect propagation based on recurrent neural networks. IEEE Trans. Instrum. Meas. 60(3), 703\u2013711 (2011)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"12","key":"11_CR21","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1016\/j.sigpro.2003.07.018","volume":"83","author":"M Markou","year":"2003","unstructured":"Markou, M., Singh, S.: Novelty detection: a review-part 1: statistical approaches. Signal Process. 83(12), 2481\u20132497 (2003)","journal-title":"Signal Process."},{"issue":"12","key":"11_CR22","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1016\/j.jpdc.2012.08.006","volume":"72","author":"J Niu","year":"2012","unstructured":"Niu, J., Gao, Y., et al.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. J. Paralell. Distrib. Comput. 72(12), 1565\u20131575 (2012)","journal-title":"J. Paralell. Distrib. Comput."},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Pecht, M.: Prognostics and health management of electronics. In: Encyclopedia of Structural Health Monitoring. Wiley (2009)","DOI":"10.1002\/9780470061626.shm118"},{"issue":"13","key":"11_CR24","first-page":"10327","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE IoT J. 8(13), 10327\u201310335 (2020)","journal-title":"IEEE IoT J."},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ins.2019.06.031","volume":"502","author":"H Qiu","year":"2019","unstructured":"Qiu, H., Kapusta, K., et al.: All-or-nothing data protection for ubiquitous communication: challenges and perspectives. Inf. Sci. 502, 434\u2013445 (2019)","journal-title":"Inf. Sci."},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. Intell. Transp. Syst. 22, 4560\u20134569 (2020)","DOI":"10.1109\/TITS.2020.3032882"},{"issue":"2","key":"11_CR27","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/JSYST.2014.2345733","volume":"11","author":"M Qiu","year":"2014","unstructured":"Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Sys. J. 11(2), 813\u2013822 (2014)","journal-title":"IEEE Sys. J."},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. J. of Signal Proc, Syst. 46, 55\u201373 ((2007)","DOI":"10.1007\/s11265-006-0002-0"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Qiu, M., Li, H., Sha, E.: Heterogeneous real-time embedded software optimization considering hardware platform. In: ACM Symposium on Applied Computing, pp. 1637\u20131641 (2009)","DOI":"10.1145\/1529282.1529651"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE 6th International Conference on BigDataSecurity, pp. 94\u201399 (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00027"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Qiu, M., Qiu, H., et al.: Secure data sharing through untrusted clouds with blockchain-enabled key management. In: 3rd SmartBlock Conference on Smart BlockChain (SmartBlock), pp. 11\u201316 (2020)","DOI":"10.1109\/SmartBlock52591.2020.00010"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., Shao, Z., et al.: Efficient algorithm of energy minimization for heterogeneous wireless sensor network. In: 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 25\u201334 (2006)","DOI":"10.1007\/11802167_5"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., et al.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE Design, Automation Exhibition Conference, pp. 1\u20136 (2007)","DOI":"10.1109\/DATE.2007.364537"},{"issue":"3","key":"11_CR34","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TVLSI.2008.2010941","volume":"18","author":"M Qiu","year":"2009","unstructured":"Qiu, M., Yang, L., Shao, Z., Sha, E.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE Trans. Very Large Scale Inetegr. 18(3), 501\u2013504 (2009)","journal-title":"IEEE Trans. Very Large Scale Inetegr."},{"issue":"2000","key":"11_CR35","doi-asserted-by":"publisher","first-page":"20120310","DOI":"10.1098\/rsta.2012.0310","volume":"371","author":"M Qiu","year":"2013","unstructured":"Qiu, M., et al.: RNA nanotechnology for computer design and in vivo computation. Philos. Trans. R.Soc. A: Math., Phy. Eng. Sci. 371(2000), 20120310 (2013)","journal-title":"Philos. Trans. R.Soc. A: Math., Phy. Eng. Sci."},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., Shao, Z., Sha, E.H.M.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: 2007 Design, Automation & Test in Europe Conference & Exhibition, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/DATE.2007.364537"},{"issue":"3","key":"11_CR37","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1049\/ip-vis:19990428","volume":"146","author":"SJ Roberts","year":"1999","unstructured":"Roberts, S.J.: Novelty detection using extreme value statistics. IEE Proc. Vis. Image Signal Process. 146(3), 124\u2013129 (1999)","journal-title":"IEE Proc. Vis. Image Signal Process."},{"issue":"02","key":"11_CR38","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1142\/S0129065704001899","volume":"14","author":"M Seeger","year":"2004","unstructured":"Seeger, M.: Gaussian processes for machine learning. Int. J. Neural Syst. 14(02), 69\u2013106 (2004)","journal-title":"Int. J. Neural Syst."},{"issue":"1\u20132","key":"11_CR39","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.ymssp.2012.08.016","volume":"35","author":"XS Si","year":"2013","unstructured":"Si, X.S., Wang, W., Hu, C.H., Chen, M.Y., Zhou, D.H.: A wiener-process-based degradation model with a recursive filter algorithm for remaining useful life estimation. Mech. Syst. Signal Process. 35(1\u20132), 219\u2013237 (2013)","journal-title":"Mech. Syst. Signal Process."},{"issue":"7","key":"11_CR40","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1049\/joe.2014.0303","volume":"2015","author":"T Sutharssan","year":"2015","unstructured":"Sutharssan, T., Stoyanov, S., Bailey, C., Yin, C.: Prognostic and health management for engineering systems: a review of the data-driven approach and algorithms. J. Eng. 2015(7), 215\u2013222 (2015)","journal-title":"J. Eng."},{"key":"11_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106330","volume":"134","author":"B Wang","year":"2019","unstructured":"Wang, B., Lei, Y., Li, N., Yan, T.: Deep separable convolutional network for remaining useful life prediction of machinery. Mech. Syst. Signal Process. 134, 106330 (2019)","journal-title":"Mech. Syst. Signal Process."},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Wang, D., Liu, K., Zhang, X.: A generic indirect deep learning approach for multisensor degradation modeling. IEEE Trans. Autom. Sci. Eng. 19, 1924\u20131940 (2021)","DOI":"10.1109\/TASE.2021.3072363"},{"issue":"2","key":"11_CR43","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1080\/00949655.2013.824448","volume":"85","author":"X Wang","year":"2015","unstructured":"Wang, X., Balakrishnan, N., Guo, B., Jiang, P.: Residual life estimation based on bivariate non-stationary gamma degradation process. J. Stat. Comput. Simul. 85(2), 405\u2013421 (2015)","journal-title":"J. Stat. Comput. Simul."},{"key":"11_CR44","unstructured":"Wilson, A., Adams, R.: Gaussian process kernels for pattern discovery and extrapolation. In: International Conference on Machine Learning. pp. 1067\u20131075. PMLR (2013)"},{"issue":"3","key":"11_CR45","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.jpdc.2012.09.007","volume":"73","author":"G Wu","year":"2013","unstructured":"Wu, G., Zhang, H., Qiu, M., Ming, Z., Li, J., Qin, X.: A decentralized approach for mining event correlations in distributed system monitoring. J. Parallel Distrib Compu. 73(3), 330\u2013340 (2013)","journal-title":"J. Parallel Distrib Compu."},{"key":"11_CR46","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1016\/j.rser.2013.07.026","volume":"27","author":"J Yan","year":"2013","unstructured":"Yan, J., Liu, Y., Han, S., Qiu, M.: Wind power grouping forecasts and its uncertainty analysis using optimized relevance vector machine. Renew Sustain Energy Rev. 27, 613\u2013621 (2013)","journal-title":"Renew Sustain Energy Rev."},{"key":"11_CR47","doi-asserted-by":"publisher","first-page":"162415","DOI":"10.1109\/ACCESS.2019.2950985","volume":"7","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Lin, J., Liu, B., Zhang, Z., Yan, X., Wei, M.: A review on deep learning applications in prognostics and health management. IEEE Access 7, 162415\u2013162438 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28124-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:38:30Z","timestamp":1680172710000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28124-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031281235","9783031281242"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28124-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"312","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}