{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:47:54Z","timestamp":1776181674330,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031436802","type":"print"},{"value":"9783031436819","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43681-9_9","type":"book-chapter","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T06:02:16Z","timestamp":1694844136000},"page":"151-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Impossible Made Possible: Encoding Intractable Specifications via\u00a0Implied Domain Constraints"],"prefix":"10.1007","author":[{"given":"Chris","family":"Johannsen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Brian","family":"Kempa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Phillip H.","family":"Jones","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kristin Y.","family":"Rozier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tichakorn","family":"Wongpiromsarn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,9,17]]},"reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1006\/inco.1993.1025","volume":"104","author":"R Alur","year":"1993","unstructured":"Alur, R., Henzinger, T.A.: Real-time logics: complexity and expressiveness. Inf. Comput. 104(1), 35\u201377 (1993)","journal-title":"Inf. Comput."},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Aurandt, A., Jones, P., Rozier, K.Y.: Runtime verification triggers real-time, autonomous fault recovery on the CySat-I. In: Deshmukh, J.V., Havelund, K., Perez, I. (eds.) NASA Formal Methods. NFM 2022. LNCS, vol. 13260. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_45","DOI":"10.1007\/978-3-031-06773-0_45"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-75632-5_1","volume-title":"Lectures on Runtime Verification","author":"E Bartocci","year":"2018","unstructured":"Bartocci, E., Falcone, Y., Francalanza, A., Reger, G.: Introduction to runtime verification. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 1\u201333. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_1"},{"key":"9_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-030-59155-7_26","volume-title":"Software Architecture","author":"M Cauwels","year":"2020","unstructured":"Cauwels, M., Hammer, A., Hertz, B., Jones, P.H., Rozier, K.Y.: Integrating runtime verification into an automated UAS traffic management system. In: Muccini, H., et al. (eds.) ECSA 2020. CCIS, vol. 1269, pp. 340\u2013357. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59155-7_26"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/3-540-48242-3_5","volume-title":"Logic for Programming and Automated Reasoning","author":"S Cerrito","year":"1999","unstructured":"Cerrito, S., Mayer, M.C., Praud, S.: First order linear temporal logic over finite time structures. In: Ganzinger, H., McAllester, D., Voronkov, A. (eds.) LPAR 1999. LNCS (LNAI), vol. 1705, pp. 62\u201376. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48242-3_5"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Chen, Y., Zhang, X., Li, J.: Finite quantified linear temporal logic and its satisfiability checking. In: Chen, Y., Zhang, S. (eds.) Artificial Intelligence Logic and Applications. AILA 2022 2022. Communications in Computer and Information Science, vol. 1657. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-19-7510-3_1","DOI":"10.1007\/978-981-19-7510-3_1"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Dabney, J.B., Badger, J.M., Rajagopal, P.: Adding a verification view for an autonomous real-time system architecture. In: Proceedings of SciTech Forum, pp. 2021\u20130566. AIAA (2021). https:\/\/doi.org\/10.2514\/6.2021-0566","DOI":"10.2514\/6.2021-0566"},{"key":"9_CR8","unstructured":"Dabney, J.B.: Using assume-guarantee contracts in autonomous spacecraft. Flight Software Workshop (FSW) (2021). https:\/\/www.youtube.com\/watch?v=zrtyiyNf674"},{"key":"9_CR9","unstructured":"Dabney, J.B., Rajagopal, P., Badger, J.M.: Using assume-guarantee contracts for developmental verification of autonomous spacecraft. Flight Software Workshop (FSW) (2022). https:\/\/www.youtube.com\/watch?v=HFnn6TzblPg"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-319-02444-8_31","volume-title":"Automated Technology for Verification and Analysis","author":"A Duret-Lutz","year":"2013","unstructured":"Duret-Lutz, A.: Manipulating LTL formulas using spot 1.0. In: Van Hung, D., Ogawa, M. (eds.) ATVA 2013. LNCS, vol. 8172, pp. 442\u2013445. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-02444-8_31"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Duret-Lutz, et al.: From spot 2.0 to spot 2.10: What\u2019s new? In: Shoham, S., Vizel, Y. (eds.) Computer Aided Verification. CAV 2022. LNCS, vol. 13372. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13188-2_9","DOI":"10.1007\/978-3-031-13188-2_9"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Havelund, K., Reger, G.: Runtime verification logics a language design perspective. Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, pp. 310\u2013338 (2017)","DOI":"10.1007\/978-3-319-63121-9_16"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-75632-5_3","volume-title":"Lectures on Runtime Verification","author":"K Havelund","year":"2018","unstructured":"Havelund, K., Reger, G., Thoma, D., Z\u0103linescu, E.: Monitoring events that carry data. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 61\u2013102. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_3"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"He, X., Lee, J.A.N.: Integrating predicate transition nets with first order temporal logic in the specification and verification of concurrent systems. Form. Asp. Comput. 2(1), 226\u2013246 (1990). https:\/\/doi.org\/10.1007\/BF01888226","DOI":"10.1007\/BF01888226"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Hertz, B., Luppen, Z., Rozier, K.Y.: Integrating runtime verification into a sounding rocket control system. In: Proceedings of the 13th NASA Formal Methods Symposium (NFM 2021) (2021). https:\/\/temporallogic.org\/research\/NFM21\/","DOI":"10.1007\/978-3-030-76384-8_10"},{"key":"9_CR16","unstructured":"Kempa, B., Johannsen, C., Rozier, K.Y.: Improving usability and trust in real-time verification of a large-scale complex safety-critical system. Ada User J. 43 (2022)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-030-57628-8_12","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"B Kempa","year":"2020","unstructured":"Kempa, B., Zhang, P., Jones, P.H., Zambreno, J., Rozier, K.Y.: Embedding online runtime verification for fault disambiguation on robonaut2. In: Bertrand, N., Jansen, N. (eds.) FORMATS 2020. LNCS, vol. 12288, pp. 196\u2013214. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57628-8_12"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Kempa, B., Zhang, P., Jones, P.H., Zambreno, J., Rozier, K.Y.: Embedding online runtime verification for fault disambiguation on robonaut2. In: Under Submission. TBD (2021)","DOI":"10.1007\/978-3-030-57628-8_12"},{"key":"9_CR19","unstructured":"Kessler, F.B.: nuXmv 1.1.0 (2016\u201305-10) Release Notes. https:\/\/es-static.fbk.eu\/tools\/nuxmv\/downloads\/NEWS.txt (2016)"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Khoury, R., Halle, S.: Tally keeping-LTL: An LTL semantics for quantitative evaluation of LTL specifications. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI), pp. 495\u2013502. IEEE Computer Society, Los Alamitos, CA, USA (2018). https:\/\/doi.org\/10.1109\/IRI.2018.00079. https:\/\/doi.ieeecomputersociety.org\/10.1109\/IRI.2018.00079","DOI":"10.1109\/IRI.2018.00079"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-662-49630-5_20","volume-title":"Foundations of Software Science and Computation Structures","author":"SN Krishna","year":"2016","unstructured":"Krishna, S.N., Madnani, K., Pandya, P.K.: Metric temporal logic with counting. In: Jacobs, B., L\u00f6ding, C. (eds.) FoSSaCS 2016. LNCS, vol. 9634, pp. 335\u2013352. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49630-5_20"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-319-46520-3_14","volume-title":"Automated Technology for Verification and Analysis","author":"D Kuperberg","year":"2016","unstructured":"Kuperberg, D., Brunel, J., Chemouil, D.: On finite domains in first-order linear temporal logic. In: Artho, C., Legay, A., Peled, D. (eds.) ATVA 2016. LNCS, vol. 9938, pp. 211\u2013226. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46520-3_14"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-25543-5_1","volume-title":"Computer Aided Verification","author":"J Li","year":"2019","unstructured":"Li, J., Vardi, M.Y., Rozier, K.Y.: Satisfiability checking for mission-time LTL. In: Dillig, I., Tasiran, S. (eds.) CAV 2019. LNCS, vol. 11562, pp. 3\u201322. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25543-5_1"},{"key":"9_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2022.104923","volume":"289","author":"J Li","year":"2022","unstructured":"Li, J., Vardi, M.Y., Rozier, K.Y.: Satisfiability checking for mission-time LTL (MLTL). Inf. Comput. 289, 104923 (2022)","journal-title":"Inf. Comput."},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Luppen, Z., et al.: Elucidation and analysis of specification patterns in aerospace system telemetry. In: Deshmukh, J.V., Havelund, K., Perez, I. (eds.) NASA Formal Methods. NFM 2022. LNCS, vol. 13260. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_28","DOI":"10.1007\/978-3-031-06773-0_28"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-30206-3_12","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"O Maler","year":"2004","unstructured":"Maler, O., Nickovic, D.: Monitoring temporal properties of continuous signals. In: Lakhnech, Y., Yovine, S. (eds.) FORMATS\/FTRTFT -2004. LNCS, vol. 3253, pp. 152\u2013166. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30206-3_12"},{"issue":"8","key":"9_CR27","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TSE.2016.2520468","volume":"42","author":"MA Noureddine","year":"2016","unstructured":"Noureddine, M.A., Zaraket, F.A.: Model checking software with first order logic specifications using AIG solvers. IEEE Trans. Software Eng. 42(8), 741\u2013763 (2016). https:\/\/doi.org\/10.1109\/TSE.2016.2520468","journal-title":"IEEE Trans. Software Eng."},{"key":"9_CR28","unstructured":"Okubo, N.: Using R2U2 in JAXA program. Electronic correspondence (November-December 2020). Series of emails and zoom call from JAXA to PI with technical questions about embedding R2U2 into an autonomous satellite mission with a provable memory bound of 200 KB"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85778-5_1","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"J Ouaknine","year":"2008","unstructured":"Ouaknine, J., Worrell, J.: Some recent results in metric temporal logic. In: Cassez, F., Jard, C. (eds.) FORMATS 2008. LNCS, vol. 5215, pp. 1\u201313. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85778-5_1"},{"key":"9_CR30","unstructured":"Piribauer, J., Baier, C., Bertrand, N., Sankur, O.: Quantified linear temporal logic over probabilistic systems with an application to vacuity checking. In: CONCUR 2021\u201332nd International Conference on Concurrency Theory, pp. 1\u201318 (2021)"},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"Regis, G., Degiovanni, R., D\u2019Ippolito, N., Aguirre, N.: Specifying event-based systems with a counting fluent temporal logic. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 733\u2013743 (2015). https:\/\/doi.org\/10.1109\/ICSE.2015.86","DOI":"10.1109\/ICSE.2015.86"},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-54862-8_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T Reinbacher","year":"2014","unstructured":"Reinbacher, T., Rozier, K.Y., Schumann, J.: Temporal-logic based runtime observer pairs for system health management of real-time systems. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 357\u2013372. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_24"},{"key":"9_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-319-48869-1_2","volume-title":"Verified Software. Theories, Tools, and Experiments","author":"KY Rozier","year":"2016","unstructured":"Rozier, K.Y.: Specification: The Biggest Bottleneck in Formal Methods and Autonomy. In: Blazy, S., Chechik, M. (eds.) VSTTE 2016. LNCS, vol. 9971, pp. 8\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48869-1_2"},{"issue":"4","key":"9_CR34","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/TRO.2019.2957669","volume":"36","author":"YE Sahin","year":"2020","unstructured":"Sahin, Y.E., Nilsson, P., Ozay, N.: Multirobot coordination with counting temporal logics. IEEE Trans. Rob. 36(4), 1189\u20131206 (2020). https:\/\/doi.org\/10.1109\/TRO.2019.2957669","journal-title":"IEEE Trans. Rob."},{"issue":"2\u20133","key":"9_CR35","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/0304-3975(87)90008-9","volume":"49","author":"AP Sistla","year":"1987","unstructured":"Sistla, A.P., Vardi, M.Y., Wolper, P.: The complementation problem for b\u00fcchi automata with applications to temporal logic. Theoret. Comput. Sci. 49(2\u20133), 217\u2013237 (1987)","journal-title":"Theoret. Comput. Sci."},{"key":"9_CR36","doi-asserted-by":"publisher","unstructured":"Sistla, A., Clarke, E., Francez, N., Meyer, A.: Can message buffers be axiomatized in linear temporal logic? Inf. Control 63(1), 88\u2013112 (1984). https:\/\/doi.org\/10.1016\/S0019-9958(84)80043-1. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0019995884800431","DOI":"10.1016\/S0019-9958(84)80043-1"},{"key":"9_CR37","unstructured":"Software, F.: Setting the Open File Limit (Linux\/Unix). https:\/\/docs.revenera.com\/fnci6133\/Content\/helplibrary\/Setting_the_Open_File_Limit__Linux_Unix_.html (2019)"},{"key":"9_CR38","unstructured":"Song, F., Wu, Z.: Extending temporal logics with data variable quantifications. In: 34th International Conference on Foundation of Software Technology and Theoretical Computer Science (FSTTCS 2014). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2014)"},{"key":"9_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45319-9_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"MY Vardi","year":"2001","unstructured":"Vardi, M.Y.: Branching vs. linear time: final showdown. In: Margaria, T., Yi, W. (eds.) TACAS 2001. LNCS, vol. 2031, pp. 1\u201322. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45319-9_1"},{"issue":"1\u20132","key":"9_CR40","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/S0019-9958(83)80051-5","volume":"56","author":"P Wolper","year":"1983","unstructured":"Wolper, P.: Temporal logic can be more expressive. Inf. Control 56(1\u20132), 72\u201399 (1983)","journal-title":"Inf. Control"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43681-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T09:05:19Z","timestamp":1710839119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43681-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031436802","9783031436819"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43681-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FMICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Methods for Industrial Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antwerp","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fmics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.uantwerpen.be\/en\/conferences\/confest-2023\/fmics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}