{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T03:42:50Z","timestamp":1764906170020,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031281235"},{"type":"electronic","value":"9783031281242"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28124-2_66","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"695-704","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Investigation of Blockchain-Based Sharding"],"prefix":"10.1007","author":[{"given":"Jiahong","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Jiahong","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Hangyu","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Songyou","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"66_CR1","doi-asserted-by":"crossref","unstructured":"Xu, Z., et al.:A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE TII 18(10), 7118\u20137127 (2021)","DOI":"10.1109\/TII.2021.3129631"},{"issue":"09","key":"66_CR2","first-page":"2365","volume":"27","author":"Y Xie","year":"2016","unstructured":"Xie, Y., Liang, W., Li, R.F., et al.: An in-vehicle CAN signal packing algorithm for connected vehicle environment. J. Softw. 27(09), 2365\u20132376 (2016)","journal-title":"J. Softw."},{"key":"66_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbvi.2019.e00151","volume":"13","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Bellavitis, C.: Blockchain disruption and decentralized finance: The rise of decentralized business models. J. Bus. Vent. Insights 13, e00151 (2020)","journal-title":"J. Bus. Vent. Insights"},{"issue":"4s","key":"66_CR4","first-page":"1","volume":"12","author":"Y Li","year":"2016","unstructured":"Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multi. Comput. Commun. Appl. 12(4s), 1\u201318 (2016)","journal-title":"ACM Trans. Multi. Comput. Commun. Appl."},{"key":"66_CR5","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"66_CR6","doi-asserted-by":"crossref","unstructured":"Zuo, C., et al.: Trust-aware and low energy consumption security topology protocol of wireless sensor network. J. Sens. (2015)","DOI":"10.1155\/2015\/716468"},{"key":"66_CR7","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., Shao, Z., Sha, E.H.M.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE Conference, pp. 1\u20136 (2007)","DOI":"10.1109\/DATE.2007.364537"},{"key":"66_CR8","doi-asserted-by":"publisher","unstructured":"Qiu, M., Xue, C., Shao, Z., Zhuge, Q., Liu, M., Sha, E.H.M.: Efficent algorithm of energy minimization for heterogeneous wireless sensor network. In: Sha, E., Han, S.K., Xu, C.Z., Kim, M.H., Yang, L.T., Xiao, B. (eds.) Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol. 4096, pp. 25\u201334. Springer, Berlin, Heidelberg (2006).https:\/\/doi.org\/10.1007\/11802167_5","DOI":"10.1007\/11802167_5"},{"issue":"1","key":"66_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-016-0028-x","volume":"7","author":"L Peng","year":"2017","unstructured":"Peng, L., et al.: Improved low-rank matrix recovery method for predicting miRNA-disease association. Sci. Rep. 7(1), 1\u201310 (2017)","journal-title":"Sci. Rep."},{"issue":"4","key":"66_CR10","first-page":"656","volume":"13","author":"F Hu","year":"2009","unstructured":"Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE TITB 13(4), 656\u2013663 (2009)","journal-title":"IEEE TITB"},{"issue":"7","key":"66_CR11","first-page":"4560","volume":"22","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. ITS 22(7), 4560\u20134569 (2020)","journal-title":"IEEE Trans. ITS"},{"key":"66_CR12","doi-asserted-by":"crossref","unstructured":"Gai, K., Zhang, Y., Qiu, M., Thuraisingham, B.: Blockchain-enabled service optimizations in supply chain digital twin. IEEE Trans. Serv. Comput. (2022)","DOI":"10.1109\/TSC.2022.3192166"},{"issue":"09","key":"66_CR13","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.13382\/j.jemi.2017.09.020","volume":"31","author":"W Jing","year":"2017","unstructured":"Jing, W., Chong, Z., Wei, L., Xiangyang, L.: Localized restoration coding based on Pyramid codes in distributed storage systems. J. Electr. Meas. Instrum. 31(09), 1481\u20131487 (2017). https:\/\/doi.org\/10.13382\/j.jemi.2017.09.020","journal-title":"J. Electr. Meas. Instrum."},{"issue":"2","key":"66_CR14","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/JSYST.2014.2345733","volume":"11","author":"M Qiu","year":"2014","unstructured":"Qiu, M., Chen, Z., Ming, Z., Qin, X., Niu, J.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813\u2013822 (2014)","journal-title":"IEEE Syst. J."},{"issue":"9","key":"66_CR15","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.sysarc.2011.03.005","volume":"57","author":"J Li","year":"2011","unstructured":"Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Arch. 57(9), 840\u2013849 (2011)","journal-title":"J. Syst. Arch."},{"key":"66_CR16","doi-asserted-by":"crossref","unstructured":"Conoscenti, M., Antonio, V., De Martin, J.C.: Blockchain for the internet of things: a systematic literature review. In: IEEE\/ACS AICCSA (2016)","DOI":"10.1109\/AICCSA.2016.7945805"},{"issue":"13","key":"66_CR17","doi-asserted-by":"publisher","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327\u201310335 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"66_CR18","first-page":"1565","volume":"72","author":"J Niu","year":"2012","unstructured":"Niu, J., Gao, Y., Qiu, M., Ming, Z.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC 72(12), 1565\u20131575 (2012)","journal-title":"JPDC"},{"key":"66_CR19","doi-asserted-by":"crossref","unstructured":"Qiu, M., Li, H., Sha, E.: Heterogeneous real-time embedded software optimization considering hardware platform. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1637\u20131641 (2009)","DOI":"10.1145\/1529282.1529651"},{"key":"66_CR20","first-page":"55","volume":"46","author":"M Qiu","year":"2007","unstructured":"Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. J. Signal Proc. Syst. 46, 55\u201373 (2007)","journal-title":"J. Signal Proc. Syst."},{"key":"66_CR21","doi-asserted-by":"crossref","unstructured":"Luu, L., et al.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978389"},{"key":"66_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wang, Y., Jin, Y.: Research on the improvement of MongoDB auto-sharding in cloud environment. In: 7th IEEE ICCSE (2012)","DOI":"10.1109\/ICCSE.2012.6295203"},{"issue":"10","key":"66_CR23","doi-asserted-by":"publisher","first-page":"6543","DOI":"10.1109\/TII.2020.2966069","volume":"16","author":"W Liang","year":"2020","unstructured":"Liang, W., et al.: Secure data storage and recovery in industrial blockchain network environments. IEEE Trans. Ind. Inf. 16(10), 6543\u20136552 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"11","key":"66_CR24","first-page":"2266","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang, S., et al.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. SMC: Syst. 49(11), 2266\u20132277 (2019)","journal-title":"IEEE Trans. SMC: Syst."},{"issue":"5","key":"66_CR25","doi-asserted-by":"publisher","first-page":"7992","DOI":"10.1109\/JIOT.2019.2904303","volume":"6","author":"K Gai","year":"2019","unstructured":"Gai, K., et al.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992\u20138004 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"66_CR26","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Kumar, R., et al.: PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326\u20132341 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"10","key":"66_CR27","first-page":"2390","volume":"54","author":"H Yu","year":"2017","unstructured":"Yu, H., Zhang, Z., Liu, J.: Research on bitcoin blockchain scaling technology. Comput. Res. Develop. 54(10), 2390\u20132403 (2017)","journal-title":"Comput. Res. Develop."},{"key":"66_CR28","doi-asserted-by":"publisher","unstructured":"Zeng, S., et al.: Blockchain scaling for bitcoin: key technologies, constraints and derived problems.J. Auto. 45(06) 1015\u20131030 (2019). https:\/\/doi.org\/10.16383\/j.aas.c180100","DOI":"10.16383\/j.aas.c180100"},{"key":"66_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, F., et al.:Federated learning meets blockchain: state channel based distributed data sharing trust supervision mechanism. IEEE IoT J. (2021)","DOI":"10.1109\/JIOT.2021.3130116"},{"key":"66_CR30","doi-asserted-by":"publisher","first-page":"102471","DOI":"10.1016\/j.jnca.2019.102471","volume":"149","author":"A Singh","year":"2020","unstructured":"Singh, A., et al.: Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Appl. 149, 102471 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"66_CR31","doi-asserted-by":"publisher","unstructured":"Vukoli\u0107, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdo\u011fan, D. (eds.) Open Problems in Network Security. iNetSec 2015. Lecture Notes in Computer Science, vol. 9591, pp. 112\u2013125 . Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39028-4_9","DOI":"10.1007\/978-3-319-39028-4_9"},{"issue":"1","key":"66_CR32","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/LWC.2018.2864758","volume":"8","author":"J Kang","year":"2018","unstructured":"Kang, J., et al.: Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks. IEEE Wirel. Commun. Lett. 8(1), 157\u2013160 (2018)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"66_CR33","doi-asserted-by":"crossref","unstructured":"Luo, Y., et al.: A new election algorithm for DPos consensus mechanism in blockchain. In: 2018 7th International Conference on Digital Home (ICDH). IEEE (2018)","DOI":"10.1109\/ICDH.2018.00029"},{"key":"66_CR34","doi-asserted-by":"crossref","unstructured":"Dang, H., et al.:Towards scaling blockchain systems via sharding. In: Proceedings of the 2019 International Conference on Management of Data (2019)","DOI":"10.1145\/3299869.3319889"},{"key":"66_CR35","first-page":"1999","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance. OsDI. 99, 1999 (1999)","journal-title":"OsDI."},{"key":"66_CR36","doi-asserted-by":"crossref","unstructured":"Miller, A., et al.: The honey badger of BFT protocols. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978399"},{"issue":"1","key":"66_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2732196","volume":"18","author":"GO Karame","year":"2015","unstructured":"Karame, G.O., et al.: Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. (TISSEC) 18(1), 1\u201332 (2015)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"66_CR38","doi-asserted-by":"publisher","unstructured":"Liu, Y., Liu, J., Li, D., Yu, H., Wu, Q.: FleetChain: a secure scalable and responsive blockchain achieving optimal sharding. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science, vol. 12454, pp. 409\u2013425. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60248-2_28","DOI":"10.1007\/978-3-030-60248-2_28"},{"key":"66_CR39","doi-asserted-by":"publisher","DOI":"10.27005\/d.cnki.gdzku.2021.005445","author":"L Nankun","year":"2021","unstructured":"Nankun, L.: Research and system implementation of blockchain sharding technology in federated chain scenario. Univ. Electr. Sci. Technol. (2021). https:\/\/doi.org\/10.27005\/d.cnki.gdzku.2021.005445","journal-title":"Univ. Electr. Sci. Technol."},{"key":"66_CR40","doi-asserted-by":"crossref","unstructured":"Wang, G., et al.: Sok: sharding on blockchain. In:Proceedings of the 1st ACM Conference on Advances in Financial Technologies (2019)","DOI":"10.1145\/3318041.3355457"},{"issue":"3","key":"66_CR41","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1080\/09540091.2020.1854181","volume":"33","author":"S Zhang","year":"2021","unstructured":"Zhang, S., et al.: A novel blockchain-based privacy-preserving framework for online social networks. Connect. Sci. 33(3), 555\u2013575 (2021)","journal-title":"Connect. Sci."},{"key":"66_CR42","doi-asserted-by":"publisher","unstructured":"Yang, Y.Z.: Research on the improvement of blockchain slicing strategy. Tianjin Univ. (2019). https:\/\/doi.org\/10.27356\/d.cnki.gtjdu.2019.002400","DOI":"10.27356\/d.cnki.gtjdu.2019.002400"},{"issue":"11","key":"66_CR43","doi-asserted-by":"publisher","first-page":"7650","DOI":"10.1109\/TII.2021.3051607","volume":"17","author":"X Cai","year":"2021","unstructured":"Cai, X., et al.: A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things. IEEE Trans. Ind. Inf. 17(11), 7650\u20137658 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"66_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Skychain: a deep reinforcement learning-empowered dynamic blockchain sharding system. In: 49th IEEE ICPP (2020)","DOI":"10.1145\/3404397.3404460"},{"key":"66_CR45","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., et al.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP) (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"66_CR46","first-page":"460","volume":"2018","author":"M Zamani","year":"2018","unstructured":"Zamani, M., Movahedi, M., Raykova, M.: RapidChain: a fast blockchain protocol via full sharding. IACR Cryptol. ePrint Arch. 2018, 460 (2018)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"66_CR47","doi-asserted-by":"crossref","unstructured":"Manuskin, A., Mirkin, M., Eyal, I.: Ostraka: secure blockchain scaling by node sharding. In 2020 IEEE European Symposium on Security and Privacy (EuroS&PW) (2020)","DOI":"10.1109\/EuroSPW51379.2020.00060"},{"key":"66_CR48","doi-asserted-by":"crossref","unstructured":"Nguyen, L.N., et al.: Optchain: optimal transactions placement for scalable blockchain sharding. In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (2019)","DOI":"10.1109\/ICDCS.2019.00059"},{"issue":"3","key":"66_CR49","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1109\/TDSC.2020.3047487","volume":"19","author":"Y Liu","year":"2020","unstructured":"Liu, Y., et al.: SSHC: A secure and scalable hybrid consensus protocol for sharding blockchains with a formal security framework. IEEE Trans. Depend. Secure Comput. 19(3), 2070\u20132088 (2020)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"66_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101055","volume":"59","author":"H Chen","year":"2019","unstructured":"Chen, H., Wang, Y.: Sschain: A full sharding protocol for public blockchain without data migration overhead. Pervasive Mob. Comput. 59, 101055 (2019)","journal-title":"Pervasive Mob. Comput."},{"key":"66_CR51","unstructured":"Wang, J., Hao, W.: Monoxide: scale out blockchains with asynchronous consensus zones. In: 16th USENIX NSDI (2019)"},{"key":"66_CR52","doi-asserted-by":"crossref","unstructured":"Huang, H, et al.: BrokerChain: a cross-shard blockchain protocol for account\/balance-based state sharding. In: IEEE INFOCOM (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796859"},{"key":"66_CR53","unstructured":"Harmony Team: Technical Whitepaper. Harmony. https:\/\/harmony.one\/whitepaper.pdf. Accessed11 Feb 2020"},{"key":"66_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","volume-title":"financial cryptography and data security","author":"K Croman","year":"2016","unstructured":"Croman, K.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106\u2013125. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_8"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28124-2_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:52:02Z","timestamp":1680173522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28124-2_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031281235","9783031281242"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28124-2_66","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"312","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}