{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:05:04Z","timestamp":1777889104322,"version":"3.51.4"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031377082","type":"print"},{"value":"9783031377099","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":197,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Dubbed a safer C, Rust is a modern programming language that combines memory safety and low-level control. This interesting combination has made Rust very popular among developers and there is a growing trend of migrating legacy codebases (very often in C) to Rust. In this paper, we present a C to Rust translation approach centred around static ownership analysis. We design a suite of analyses that infer ownership models of C pointers and automatically translate the pointers into safe Rust equivalents. The resulting tool, <jats:sc>Crown<\/jats:sc>, scales to real-world codebases (half a million lines of code in less than 10\u00a0s) and achieves a high conversion rate.<\/jats:p>","DOI":"10.1007\/978-3-031-37709-9_22","type":"book-chapter","created":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T10:01:21Z","timestamp":1689501681000},"page":"459-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Ownership Guided C to\u00a0Rust Translation"],"prefix":"10.1007","author":[{"given":"Hanliang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Cristina","family":"David","sequence":"additional","affiliation":[]},{"given":"Yijun","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","unstructured":"Aldrich, J., Kostadinov, V., Chambers, C.: Alias annotations for program understanding. In: Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications. OOPSLA \u201902, pp. 311\u2013330. Association for Computing Machinery, New York, NY, USA (2002). https:\/\/doi.org\/10.1145\/582419.582448","DOI":"10.1145\/582419.582448"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Astrauskas, V., Matheja, C., Poli, F., M\u00fcller, P., Summers, A.J.: How do programmers use unsafe rust? Proc. ACM Program. Lang. 4(OOPSLA) (2020). https:\/\/doi.org\/10.1145\/3428204","DOI":"10.1145\/3428204"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Astrauskas, V., M\u00fcller, P., Poli, F., Summers, A.J.: Leveraging rust types for modular specification and verification. Proc. ACM Program. Lang. 3(OOPSLA) (oct 2019). https:\/\/doi.org\/10.1145\/3360573","DOI":"10.1145\/3360573"},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Boyapati, C., Liskov, B., Shrira, L.: Ownership types for object encapsulation. In: Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL \u201903, pp. 213\u2013223. Association for Computing Machinery, New York, NY, USA (2003). https:\/\/doi.org\/10.1145\/604131.604156","DOI":"10.1145\/604131.604156"},{"key":"22_CR5","doi-asserted-by":"publisher","unstructured":"Boyapati, C., Salcianu, A., Beebee, W., Rinard, M.: Ownership types for safe region-based memory management in real-time Java. In: Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation. PLDI \u201903, pp. 324\u2013337. Association for Computing Machinery, New York, NY, USA (2003). https:\/\/doi.org\/10.1145\/781131.781168","DOI":"10.1145\/781131.781168"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Briggs, P., Cooper, K.D., Harvey, T.J., Simpson, L.T.: Practical improvements to the construction and destruction of static single assignment form. Softw. Pract. Exper. 28(8), 859\u2013881 (1998)","DOI":"10.1002\/(SICI)1097-024X(19980710)28:8<859::AID-SPE188>3.0.CO;2-8"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Brookes, S.: Variables as resource for shared-memory programs: semantics and soundness. Electron. Notes Theor. Comput. Sci. 158, 123\u2013150 (2006). https:\/\/doi.org\/10.1016\/j.entcs.2006.04.008","DOI":"10.1016\/j.entcs.2006.04.008"},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Brookes, S.: A semantics for concurrent separation logic. Theor. Comput. Sci. 375(1\u20133), 227\u2013270 (2007). https:\/\/doi.org\/10.1016\/j.tcs.2006.12.034","DOI":"10.1016\/j.tcs.2006.12.034"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Calcagno, C., O\u2019Hearn, P.W., Yang, H.: Local action and abstract separation logic. In: Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science. p. 366\u2013378. LICS \u201907, IEEE Computer Society, USA (2007). https:\/\/doi.org\/10.1109\/LICS.2007.30","DOI":"10.1109\/LICS.2007.30"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Cheng, B.C., Hwu, W.M.W.: Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation. In: Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation. PLDI \u201900, pp. 57\u201369. Association for Computing Machinery, New York, NY, USA (2000). https:\/\/doi.org\/10.1145\/349299.349311","DOI":"10.1145\/349299.349311"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-36946-9_3","volume-title":"Aliasing in Object-Oriented Programming. Types, Analysis and Verification","author":"D Clarke","year":"2013","unstructured":"Clarke, D., \u00d6stlund, J., Sergey, I., Wrigstad, T.: Ownership types: a survey. In: Clarke, D., Noble, J., Wrigstad, T. (eds.) Aliasing in Object-Oriented Programming. Types, Analysis and Verification. LNCS, vol. 7850, pp. 15\u201358. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36946-9_3"},{"key":"22_CR12","doi-asserted-by":"publisher","unstructured":"Clarke, D.G., Potter, J.M., Noble, J.: Ownership types for flexible alias protection. In: Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications. OOPSLA \u201998, pp. 48\u201364. Association for Computing Machinery, New York, NY, USA (1998). https:\/\/doi.org\/10.1145\/286936.286947","DOI":"10.1145\/286936.286947"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Das, M.: Unification-based pointer analysis with directional assignments. In: Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation. PLDI \u201900, pp. 35\u201346. Association for Computing Machinery, New York, NY, USA (2000). https:\/\/doi.org\/10.1145\/349299.349309","DOI":"10.1145\/349299.349309"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-3-642-31057-7_29","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"A De","year":"2012","unstructured":"De, A., D\u2019Souza, D.: Scalable flow-sensitive pointer analysis for java with strong updates. In: Noble, J. (ed.) ECOOP 2012. LNCS, vol. 7313, pp. 665\u2013687. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31057-7_29"},{"key":"22_CR15","doi-asserted-by":"publisher","unstructured":"Emre, M., Boyland, P., Parekh, A., Schroeder, R., Dewey, K., Hardekopf, B.: Aliasing limits on translating c to safe rust. Proc. ACM Program. Lang. 7(OOPSLA1) (2023). https:\/\/doi.org\/10.1145\/3586046","DOI":"10.1145\/3586046"},{"key":"22_CR16","doi-asserted-by":"publisher","unstructured":"Emre, M., Schroeder, R.: Artifact for \u201ctranslating c to safer rust\u201d, September 2021. https:\/\/doi.org\/10.5281\/zenodo.5442253","DOI":"10.5281\/zenodo.5442253"},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"Emre, M., Schroeder, R., Dewey, K., Hardekopf, B.: Translating C to safer rust. Proc. ACM Program. Lang. 5(OOPSLA), 1\u201329 (2021). https:\/\/doi.org\/10.1145\/3485498","DOI":"10.1145\/3485498"},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Evans, A.N., Campbell, B., Soffa, M.L.: Is rust used safely by software developers? In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering. ICSE \u201920, pp. 246\u2013257. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3377811.3380413","DOI":"10.1145\/3377811.3380413"},{"key":"22_CR19","doi-asserted-by":"publisher","unstructured":"Feng, X.: Local rely-guarantee reasoning. In: Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL \u201909, pp. 315\u2013327. Association for Computing Machinery, New York, NY, USA (2009). https:\/\/doi.org\/10.1145\/1480881.1480922","DOI":"10.1145\/1480881.1480922"},{"key":"22_CR20","unstructured":"Fitzgerald, N., Hoare, G., Mitchener, B., Puri, S.: Rust bindings to the z3 SMT solver. https:\/\/crates.io\/crates\/z3"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Foster, J.S., Johnson, R., Kodumal, J., Aiken, A.: Flow-insensitive type qualifiers. ACM Trans. Program. Lang. Syst. 28(6), 1035\u20131087 (2006). https:\/\/doi.org\/10.1145\/1186632.1186635","DOI":"10.1145\/1186632.1186635"},{"key":"22_CR22","doi-asserted-by":"publisher","unstructured":"Greenfieldboyce, D., Foster, J.S.: Type qualifier inference for java. In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications. OOPSLA \u201907, pp. 321\u2013336. Association for Computing Machinery, New York, NY, USA (2007). https:\/\/doi.org\/10.1145\/1297027.1297051","DOI":"10.1145\/1297027.1297051"},{"key":"22_CR23","doi-asserted-by":"publisher","unstructured":"Hackett, B., Aiken, A.: How is aliasing used in systems software? In: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering. SIGSOFT \u201906\/FSE-14, pp. 69\u201380. Association for Computing Machinery, New York, NY, USA (2006). https:\/\/doi.org\/10.1145\/1181775.1181785","DOI":"10.1145\/1181775.1181785"},{"key":"22_CR24","doi-asserted-by":"publisher","unstructured":"Heine, D.L., Lam, M.S.: A practical flow-sensitive and context-sensitive C and C++ memory leak detector. In: Cytron, R., Gupta, R. (eds.) Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, San Diego, California, USA, 9\u201311 June 2003, pp. 168\u2013181. ACM (2003). https:\/\/doi.org\/10.1145\/781131.781150","DOI":"10.1145\/781131.781150"},{"key":"22_CR25","doi-asserted-by":"publisher","unstructured":"Huang, W., Milanova, A., Dietl, W., Ernst, M.D.: Reim & reiminfer: checking and inference of reference immutability and method purity. In: Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications. OOPSLA \u201912, pp. 879\u2013896. Association for Computing Machinery, New York, NY, USA (2012). https:\/\/doi.org\/10.1145\/2384616.2384680","DOI":"10.1145\/2384616.2384680"},{"key":"22_CR26","unstructured":"inc., I.: c2rust. https:\/\/github.com\/immunant\/c2rust"},{"key":"22_CR27","doi-asserted-by":"publisher","unstructured":"Jung, R., Jourdan, J.H., Krebbers, R., Dreyer, D.: Rustbelt: securing the foundations of the rust programming language. Proc. ACM Program. Lang. 2(POPL) (2017). https:\/\/doi.org\/10.1145\/3158154","DOI":"10.1145\/3158154"},{"key":"22_CR28","doi-asserted-by":"publisher","unstructured":"Jung, R., Krebbers, R., Jourdan, J.H., Bizjak, A., Birkedal, L., Dreyer, D.: Iris from the ground up: a modular foundation for higher-order concurrent separation logic. J. Funct. Program. 28(e20) (2018). https:\/\/doi.org\/10.1017\/S0956796818000151, https:\/\/hal.science\/hal-01945446","DOI":"10.1017\/S0956796818000151"},{"key":"22_CR29","doi-asserted-by":"publisher","unstructured":"Lerch, J., Sp\u00e4th, J., Bodden, E., Mezini, M.: Access-path abstraction: scaling field-sensitive data-flow analysis with unbounded access paths (t). In: 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 619\u2013629 (2015). https:\/\/doi.org\/10.1109\/ASE.2015.9","DOI":"10.1109\/ASE.2015.9"},{"key":"22_CR30","doi-asserted-by":"publisher","unstructured":"Lhot\u00e1k, O., Chung, K.C.A.: Points-to analysis with efficient strong updates. In: Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL \u201911, pp. 3\u201316. Association for Computing Machinery, New York, NY, USA (2011). https:\/\/doi.org\/10.1145\/1926385.1926389","DOI":"10.1145\/1926385.1926389"},{"key":"22_CR31","doi-asserted-by":"publisher","unstructured":"Ling, M., Yu, Y., Wu, H., Wang, Y., Cordy, J.R., Hassan, A.E.: In rust we trust - a transpiler from unsafe C to safer rust. In: 44th IEEE\/ACM International Conference on Software Engineering: Companion Proceedings, ICSE Companion 2022, Pittsburgh, PA, USA, 22\u201324 May 2022, pp. 354\u2013355. ACM\/IEEE (2022). https:\/\/doi.org\/10.1145\/3510454.3528640","DOI":"10.1145\/3510454.3528640"},{"key":"22_CR32","doi-asserted-by":"publisher","unstructured":"Machiry, A., Kastner, J., McCutchen, M., Eline, A., Headley, K., Hicks, M.: C to checked c by 3c. Proc. ACM Program. Lang. 6(OOPSLA1) (2022). https:\/\/doi.org\/10.1145\/3527322","DOI":"10.1145\/3527322"},{"key":"22_CR33","doi-asserted-by":"publisher","unstructured":"Matsakis, N.D., Klock, F.S.: The rust language. In: Proceedings of the 2014 ACM SIGAda Annual Conference on High Integrity Language Technology. HILT \u201914, pp. 103\u2013104. Association for Computing Machinery, New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2663171.2663188","DOI":"10.1145\/2663171.2663188"},{"key":"22_CR34","doi-asserted-by":"publisher","unstructured":"Matsushita, Y., Denis, X., Jourdan, J.H., Dreyer, D.: Rusthornbelt: a semantic foundation for functional verification of rust programs with unsafe code. In: Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation. PLDI 2022, pp. 841\u2013856. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3519939.3523704","DOI":"10.1145\/3519939.3523704"},{"key":"22_CR35","doi-asserted-by":"publisher","unstructured":"Matsushita, Y., Tsukada, T., Kobayashi, N.: Rusthorn: CHC-based verification for rust programs. ACM Trans. Program. Lang. Syst. 43(4) (2021). https:\/\/doi.org\/10.1145\/3462205","DOI":"10.1145\/3462205"},{"key":"22_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-662-49122-5_2","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"P M\u00fcller","year":"2016","unstructured":"M\u00fcller, P., Schwerhoff, M., Summers, A.J.: Viper: a verification infrastructure for permission-based reasoning. In: Jobstmann, B., Leino, K.R.M. (eds.) VMCAI 2016. LNCS, vol. 9583, pp. 41\u201362. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49122-5_2"},{"key":"22_CR37","doi-asserted-by":"publisher","unstructured":"Ravitch, T., Jackson, S., Aderhold, E., Liblit, B.: Automatic generation of library bindings using static analysis. In: Hind, M., Diwan, A. (eds.) Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, Dublin, Ireland, 15\u201321 June 2009, pp. 352\u2013362. ACM (2009). https:\/\/doi.org\/10.1145\/1542476.1542516","DOI":"10.1145\/1542476.1542516"},{"key":"22_CR38","doi-asserted-by":"publisher","unstructured":"Vafeiadis, V., Herlihy, M., Hoare, T., Shapiro, M.: Proving correctness of highly-concurrent linearisable objects. In: Proceedings of the Eleventh ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. PPoPP \u201906, pp. 129\u2013136. Association for Computing Machinery, New York, NY, USA (2006). https:\/\/doi.org\/10.1145\/1122971.1122992","DOI":"10.1145\/1122971.1122992"},{"key":"22_CR39","doi-asserted-by":"publisher","unstructured":"Wolff, F., B\u00edl\u00fd, A., Matheja, C., M\u00fcller, P., Summers, A.J.: Modular specification and verification of closures in rust. Proc. ACM Program. Lang. 5(OOPSLA) (2021). https:\/\/doi.org\/10.1145\/3485522","DOI":"10.1145\/3485522"},{"key":"22_CR40","doi-asserted-by":"publisher","unstructured":"Wu, J., Hu, G., Tang, Y., Yang, J.: Effective dynamic detection of alias analysis errors. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering. ESEC\/FSE 2013, pp. 279\u2013289. Association for Computing Machinery, New York, NY, USA (2013). https:\/\/doi.org\/10.1145\/2491411.2491439","DOI":"10.1145\/2491411.2491439"},{"key":"22_CR41","unstructured":"Zhang, H., David, C., Yu, Y., Wang, M.: Ownership guided c to rust translation (2023). https:\/\/doi.org\/10.48550\/arXiv.2303.10515"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Zhao, T., Baker, J., Hunt, J., Noble, J., Vitek, J.: Implicit ownership types for memory management. Sci. Comput. Program. 71(3), 213\u2013241 (2008)","DOI":"10.1016\/j.scico.2008.04.001"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37709-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T10:03:41Z","timestamp":1689501821000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37709-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031377082","9783031377099"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37709-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Aided Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cav2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.i-cav.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"261","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}