{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:10:20Z","timestamp":1750749020797,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031377051"},{"type":"electronic","value":"9783031377068"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":197,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A safety verification task involves verifying a system against a desired safety property under certain assumptions about the environment. However, these environmental assumptions may occasionally be violated due to modeling errors or faults. Ideally, the system guarantees its critical properties even under some of these violations, i.e., the system is <jats:italic>robust<\/jats:italic> against environmental deviations. This paper proposes a notion of <jats:italic>robustness<\/jats:italic> as an explicit, first-class property of a transition system that captures how robust it is against possible <jats:italic>deviations<\/jats:italic> in the environment. We modeled deviations as a set of <jats:italic>transitions<\/jats:italic> that may be added to the original environment. Our robustness notion then describes the safety envelope of this system, i.e., it captures all sets of extra environment transitions for which the system still guarantees a desired property. We show that being able to explicitly reason about robustness enables new types of system analysis and design tasks beyond the common verification problem stated above. We demonstrate the application of our framework on case studies involving a radiation therapy interface, an electronic voting machine, a fare collection protocol, and a medical pump device.<\/jats:p>","DOI":"10.1007\/978-3-031-37706-8_17","type":"book-chapter","created":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T10:01:21Z","timestamp":1689501681000},"page":"326-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Safe Environmental Envelopes of\u00a0Discrete Systems"],"prefix":"10.1007","author":[{"given":"R\u00f4mulo","family":"Meira-G\u00f3es","sequence":"first","affiliation":[]},{"given":"Ian","family":"Dardik","sequence":"additional","affiliation":[]},{"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Lafortune","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Tripakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Alves, M.V.S., da Cunha, A.E.C., Carvalho, L.K., Moreira, M.V., Basilio, J.C.: Robust supervisory control of discrete event systems against intermittent loss of observations. Int. J. Control 1\u201313 (2019)","DOI":"10.1080\/00207179.2019.1690691"},{"key":"17_CR2","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking. The MIT Press (2008)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bloem, R., et al.: Synthesizing robust systems. Acta Inf. 51(3\u20134), 193\u2013220 (2014)","DOI":"10.1007\/s00236-013-0191-5"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bloem, R., Greimel, K., Henzinger, T.A., Jobstmann, B.: Synthesizing robust systems. In: 2009 Formal Methods in Computer-Aided Design, pp. 85\u201392 (2009)","DOI":"10.1109\/FMCAD.2009.5351139"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Bolton, M.L., Bass, E.J.: Evaluating human-automation interaction using task analytic behavior models, strategic knowledge-based erroneous human behavior generation, and model checking. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics, pp. 1788\u20131794 (2011). https:\/\/doi.org\/10.1109\/ICSMC.2011.6083931","DOI":"10.1109\/ICSMC.2011.6083931"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-85361-9_16","volume-title":"CONCUR 2008 - Concurrency Theory","author":"B Bonakdarpour","year":"2008","unstructured":"Bonakdarpour, B., Kulkarni, S.S.: SYCRAFT: a tool for synthesizing distributed fault-tolerant programs. In: van Breugel, F., Chechik, M. (eds.) CONCUR 2008. LNCS, vol. 5201, pp. 167\u2013171. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85361-9_16"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Introduction to Discrete Event Systems. Lecture Notes in Computer Science, Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72274-6_9","DOI":"10.1007\/978-3-030-72274-6_9"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Chaudhuri, S., Gulwani, S., Lublinerman, R., Navidpour, S.: Proving programs robust. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC\/FSE 2011), pp. 102\u2013112. Association for Computing Machinery (2011)","DOI":"10.1145\/2025113.2025131"},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"Cheng, C.-H., Rue\u00df, H., Knoll, A., Buckl, C.: Synthesis of fault-tolerant embedded systems using games: from theory to practice. In: Jhala, R., Schmidt, D. (eds.) VMCAI 2011. LNCS, vol. 6538, pp. 118\u2013133. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18275-4_10","DOI":"10.1007\/978-3-642-18275-4_10"},{"issue":"2","key":"17_CR10","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/9.746270","volume":"44","author":"J Cury","year":"1999","unstructured":"Cury, J., Krogh, B.: Robustness of supervisors for discrete-event systems. IEEE Trans. Automat. Control 44(2), 376\u2013379 (1999)","journal-title":"IEEE Trans. Automat. Control"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-32759-9_15","volume-title":"FM 2012: Formal Methods","author":"N D\u2019Ippolito","year":"2012","unstructured":"D\u2019Ippolito, N., Braberman, V., Piterman, N., Uchitel, S.: The modal transition system control problem. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 155\u2013170. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32759-9_15"},{"issue":"5","key":"17_CR12","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10009-008-0083-0","volume":"10","author":"A Ebnenasir","year":"2008","unstructured":"Ebnenasir, A., Kulkarni, S.S., Arora, A.: FTSyn: a framework for automatic synthesis of fault-tolerance. Int. J. Softw. Tools Technol. Transf. 10(5), 455\u2013471 (2008)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/311531.311532","volume":"31","author":"FC G\u00e4rtner","year":"1999","unstructured":"G\u00e4rtner, F.C.: Fundamentals of fault-tolerant distributed computing in asynchronous environments. ACM Comput. Surv. 31(1), 1\u201326 (1999)","journal-title":"ACM Comput. Surv."},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/s10703-009-0084-y","volume":"35","author":"A Girault","year":"2009","unstructured":"Girault, A., Rutten, E.: Automating the addition of fault tolerance with discrete controller synthesis. Formal Method. Syst. Des. 35, 190\u2013225 (2009)","journal-title":"Formal Method. Syst. Des."},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Gr\u00e4del, E., Thomas, W., Wilke, T. (eds.): Automata Logics, and Infinite Games. LNCS, vol. 2500. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36387-4","DOI":"10.1007\/3-540-36387-4"},{"key":"17_CR16","unstructured":"Henzinger, T.A., Otop, J., Samanta, R.: Lipschitz robustness of finite-state transducers. In: Raman, V., Suresh, S.P. (eds.) 34th International Conference on Foundation of Software Technology and Theoretical Computer Science (FSTTCS 2014). Leibniz International Proceedings in Informatics (LIPIcs), vol. 29, pp. 431\u2013443. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl (2014)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Kang, E.: Robustness analysis for secure software design. In: Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment (SEAD 2020), pp. 19\u201325. Association for Computing Machinery (2020)","DOI":"10.1145\/3416507.3423191"},{"issue":"7","key":"17_CR18","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.1993.274940","volume":"26","author":"N Leveson","year":"1993","unstructured":"Leveson, N., Turner, C.: An investigation of the therac-25 accidents. Computer 26(7), 18\u201341 (1993). https:\/\/doi.org\/10.1109\/MC.1993.274940","journal-title":"Computer"},{"issue":"12","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1109\/9.250564","volume":"38","author":"F Lin","year":"1993","unstructured":"Lin, F.: Robust and adaptive supervisory control of discrete event systems. IEEE Trans. Automat. Control 38(12), 1848\u20131852 (1993)","journal-title":"IEEE Trans. Automat. Control"},{"issue":"2","key":"17_CR20","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1137\/130914942","volume":"52","author":"F Lin","year":"2014","unstructured":"Lin, F.: Control of networked discrete event systems: dealing with communication delays and losses. SIAM J. Control Optimiz. 52(2), 1276\u20131298 (2014)","journal-title":"SIAM J. Control Optimiz."},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Lin, L., Zhu, Y., Su, R.: Towards bounded synthesis of resilient supervisors. In: 2019 IEEE 58th Conference on Decision and Control (CDC), pp. 7659\u20137664 (2019)","DOI":"10.1109\/CDC40024.2019.9030171"},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"WDAG 1996. LNCS, vol. 1151. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61769-8_9","DOI":"10.1007\/3-540-61769-8_9"},{"key":"17_CR23","volume-title":"Concurrency: State Models and Java Programs","author":"J Magee","year":"2000","unstructured":"Magee, J., Kramer, J.: Concurrency: State Models and Java Programs. John Wiley and Sons Inc, USA (2000)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Majumdar, R., Render, E., Tabuada, P.: Robust discrete synthesis against unspecified disturbances. In: Proceedings of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011), pp. 211\u2013220. Association for Computing Machinery (2011)","DOI":"10.1145\/1967701.1967732"},{"issue":"2","key":"17_CR25","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0168-0072(93)90036-D","volume":"65","author":"R McNaughton","year":"1993","unstructured":"McNaughton, R.: Infinite games played on finite graphs. Ann. Pure Appl. Logic 65(2), 149\u2013184 (1993)","journal-title":"Ann. Pure Appl. Logic"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es, R., Marchand, H., Lafortune, S.: Towards resilient supervisors against sensor deception attacks. In: 2019 IEEE 58th Annual Conference on Decision and Control (CDC) (2019)","DOI":"10.1109\/CDC40024.2019.9029737"},{"key":"17_CR27","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7999482","author":"R Meira-G\u00f3es","year":"2023","unstructured":"Meira-G\u00f3es, R., Dardik, I., Kang, E., Lafortune, S., Tripakis, S.: Safe environmental envelopes of discrete systems. Zenodo (2023). https:\/\/doi.org\/10.5281\/zenodo.7999482","journal-title":"Zenodo"},{"key":"17_CR28","unstructured":"Meira-Goes, R., Dardik, I., Kang, E., Lafortune, S., Tripakis, S.: Transitional robustness github repository (2023). https:\/\/github.com\/cmu-soda\/transitional-robustness. Accessed 29 May 2023"},{"key":"17_CR29","unstructured":"Meira-G\u00f3es, R., Kang, E., Lafortune, S., Tripakis, S.: On tolerance of discrete systems with respect to transition perturbations. arXiv:2110.04200 [eess.SY] (2021)"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es, R., Kang, E., Lafortune, S., Tripakis, S.: On synthesizing tolerable and permissive controllers for labeled transition systems. In: 16th IFAC Workshop on Discrete Event Systems WODES 2022, vol. 55, no. 28, pp. 158\u2013164 (2022)","DOI":"10.1016\/j.ifacol.2022.10.338"},{"issue":"10","key":"17_CR31","doi-asserted-by":"publisher","first-page":"4990","DOI":"10.1109\/TAC.2021.3051459","volume":"66","author":"R Meira-Goes","year":"2021","unstructured":"Meira-Goes, R., Lafortune, S., Marchand, H.: Synthesis of supervisors robust against sensor deception attacks. IEEE Trans. Automat. Control 66(10), 4990\u20134997 (2021)","journal-title":"IEEE Trans. Automat. Control"},{"issue":"1","key":"17_CR32","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00236-019-00345-7","volume":"57","author":"D Neider","year":"2020","unstructured":"Neider, D., Weinert, A., Zimmermann, M.: Synthesizing optimally resilient controllers. Acta Inf. 57(1), 195\u2013221 (2020)","journal-title":"Acta Inf."},{"issue":"8","key":"17_CR33","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1016\/j.automatica.2005.03.017","volume":"41","author":"A Paoli","year":"2005","unstructured":"Paoli, A., Lafortune, S.: Safe diagnosability for fault-tolerant supervision of discrete-event systems. Automatica 41(8), 1335\u20131347 (2005)","journal-title":"Automatica"},{"issue":"2","key":"17_CR34","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228\u2013234 (1980)","journal-title":"J. ACM"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Pnueli, A., Rosner, R.: On the synthesis of a reactive module. In: Proceedings of the 16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1989), pp. 179\u2013190. Association for Computing Machinery (1989)","DOI":"10.1145\/75277.75293"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science (SFCS 1977), pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"issue":"1","key":"17_CR37","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1137\/0325013","volume":"25","author":"PJ Ramadge","year":"1987","unstructured":"Ramadge, P.J., Wonham, W.M.: Supervisory control of a class of discrete event processes. SIAM J. Control Optim. 25(1), 206\u2013230 (1987)","journal-title":"SIAM J. Control Optim."},{"key":"17_CR38","unstructured":"U.S. Attorney\u2019s Office Eastern District of Kentucky. Clay county officials and residents convicted on racketeering and voter fraud charges (2010). https:\/\/archives.fbi.gov\/archives\/louisville\/press-releases\/2010\/lo032510.htm"},{"key":"17_CR39","doi-asserted-by":"crossref","unstructured":"Rohloff, K.: Bounded sensor failure tolerant supervisory control. In: 11th IFAC Workshop on Discrete Event Systems, vol. 45, no. 29, pp. 272\u2013277 (2012)","DOI":"10.3182\/20121003-3-MX-4033.00045"},{"key":"17_CR40","doi-asserted-by":"publisher","unstructured":"Samanta, R., Deshmukh, J.V., Chaudhuri, S.: Robustness analysis of string transducers. In: Van Hung, D., Ogawa, M. (eds.) ATVA 2013. LNCS, vol. 8172, pp. 427\u2013441. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-02444-8_30","DOI":"10.1007\/978-3-319-02444-8_30"},{"key":"17_CR41","doi-asserted-by":"publisher","unstructured":"Sempreboni, D., Vigan\u00f2, L.: X-men: a mutation-based approach for the formal analysis of security ceremonies. In: 2020 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 87\u2013104 (2020). https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00014","DOI":"10.1109\/EuroSP48549.2020.00014"},{"key":"17_CR42","doi-asserted-by":"crossref","unstructured":"Tabuada, P., Balkan, A., Caliskan, S.Y., Shoukry, Y., Majumdar, R.: Input-output robustness for discrete systems. In: Proceedings of the Tenth ACM International Conference on Embedded Software (EMSOFT 2012), pp. 217\u2013226. Association for Computing Machinery (2012)","DOI":"10.1145\/2380356.2380396"},{"key":"17_CR43","unstructured":"Tabuada, P., Neider, D.: Robust Linear Temporal Logic. In: Talbot, J.M., Regnier, L. (eds.) 25th EACSL Annual Conference on Computer Science Logic (CSL 2016). Leibniz International Proceedings in Informatics (LIPIcs), vol. 62, pp. 10:1\u201310:21. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl (2016)"},{"issue":"3","key":"17_CR44","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.automatica.2003.11.006","volume":"40","author":"S Takai","year":"2004","unstructured":"Takai, S.: Maximizing robustness of supervisors for partially observed discrete event systems. Automatica 40(3), 531\u2013535 (2004)","journal-title":"Automatica"},{"key":"17_CR45","doi-asserted-by":"crossref","unstructured":"Topcu, U., Ozay, N., Liu, J., Murray, R.M.: On synthesizing robust discrete controllers under modeling uncertainty. In: Proceedings of the 15th ACM International Conference on Hybrid Systems: Computation and Control (HSCC 2012), pp. 85\u201394. Association for Computing Machinery (2012)","DOI":"10.1145\/2185632.2185648"},{"key":"17_CR46","doi-asserted-by":"publisher","unstructured":"Tun, T.T., Bennaceur, A., Nuseibeh, B.: Oasis: weakening user obligations for security-critical systems. In: 2020 IEEE 28th International Requirements Engineering Conference (RE), pp. 113\u2013124 (2020). https:\/\/doi.org\/10.1109\/RE48521.2020.00023","DOI":"10.1109\/RE48521.2020.00023"},{"issue":"4","key":"17_CR47","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/TASE.2016.2588527","volume":"13","author":"F Wang","year":"2016","unstructured":"Wang, F., Shu, S., Lin, F.: Robust networked control of discrete event systems. IEEE Trans. Automat. Sci. Eng. 13(4), 1528\u20131540 (2016)","journal-title":"IEEE Trans. Automat. Sci. Eng."},{"issue":"1","key":"17_CR48","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1137\/S0363012991219766","volume":"33","author":"S Young","year":"1995","unstructured":"Young, S., Garg, V.K.: Model uncertainty in discrete event systems. SIAM J. Control Optimiz. 33(1), 208\u2013226 (1995)","journal-title":"SIAM J. Control Optimiz."},{"key":"17_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, C., Garlan, D., Kang, E.: A behavioral notion of robustness for software systems. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2020), pp. 1\u201312. Association for Computing Machinery (2020)","DOI":"10.1145\/3368089.3409753"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37706-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T11:06:00Z","timestamp":1704452760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37706-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031377051","9783031377068"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37706-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Aided Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cav2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.i-cav.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"261","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}