{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:22Z","timestamp":1742913742895,"version":"3.40.3"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319444819"},{"type":"electronic","value":"9783319444826"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44482-6_16","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T02:53:21Z","timestamp":1472007201000},"page":"248-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Short Survey on Using Software Error Localization for Service Compositions"],"prefix":"10.1007","author":[{"given":"Julia","family":"Kr\u00e4mer","sequence":"first","affiliation":[]},{"given":"Heike","family":"Wehrheim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., van Gemund, A.J.C.: An evaluation of similarity coefficients for software fault localization. In: 12th Pacific Rim International Symposium on Dependable Computing, PRDC 2006, pp. 39\u201346 (2006)","DOI":"10.1109\/PRDC.2006.18"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., van Gemund, A.J.C.: On the accuracy of spectrum-based fault localization. In: Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION, TAICPART-MUTATION 2007, pp. 89\u201398 (2007)","DOI":"10.1109\/TAIC.PART.2007.13"},{"issue":"5","key":"16_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2659118.2659125","volume":"39","author":"P Agarwal","year":"2014","unstructured":"Agarwal, P., Agrawal, A.P.: Fault-localization techniques for software systems: a literature review. SIGSOFT Softw. Eng. Notes 39(5), 1\u20138 (2014)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1002\/spe.4380230603","volume":"23","author":"H Agrawal","year":"1993","unstructured":"Agrawal, H., Demillo, R.A., Spafford, E.H.: Debugging with dynamic slicingand backtracking. Softw. Pract. Exp. 23, 589\u2013616 (1993)","journal-title":"Softw. Pract. Exp."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Agrawal, H., Horgan, J.R.: Dynamic program slicing. In: Proceedings of ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation, PLDI 1990, pp. 246\u2013256. ACM (1990)","DOI":"10.1145\/93548.93576"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Artzi, S., Dolby, J., Jensen, S.H., Moller, A., Tip, F.: A framework for automated testing of javascript web applications. In: 2011 33rd International Conference on Software Engineering (ICSE), pp. 571\u2013580 (2011)","DOI":"10.1145\/1985793.1985871"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Artzi, S., Dolby, J., Tip, F., Pistoia, M.: Directed test generation for effective fault localization. In: Proceedings of 19th International Symposium on Software Testing and Analysis, ISSTA 2010, pp. 49\u201360. ACM (2010)","DOI":"10.1145\/1831708.1831715"},{"issue":"2","key":"16_CR8","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TSE.2011.76","volume":"38","author":"S Artzi","year":"2012","unstructured":"Artzi, S., Dolby, J., Tip, F., Pistoia, M.: Fault localization for dynamic web applications. IEEE Trans. Softw. Eng. 38(2), 314\u2013335 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/TSE.2010.31","volume":"36","author":"S Artzi","year":"2010","unstructured":"Artzi, S., Kiezun, A., Dolby, J., Tip, F., Dig, D., Paradkar, A., Ernst, M.D.: Finding bugs in web applications using dynamic test generation and explicit-state model checking. IEEE Trans. Softw. Eng. 36(4), 474\u2013494 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Ball, T., Naik, M., Rajamani, S.K.: From symptom to cause: localizing errors in counterexample traces. In: Proceedings of 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2003, pp. 97\u2013105. ACM (2003)","DOI":"10.1145\/640128.604140"},{"issue":"1","key":"16_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jss.2008.03.066","volume":"82","author":"S Becker","year":"2009","unstructured":"Becker, S., Koziolek, H., Reussner, R.: The palladio component model for model-driven performance prediction. J. Syst. Softw. 82(1), 3\u201322 (2009). Special Issue: Software Performance - Modeling and Analysis","journal-title":"J. Syst. Softw."},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11786160_10","volume-title":"Architecting Systems with Trustworthy Components","author":"S Becker","year":"2006","unstructured":"Becker, S., Grunske, L., Mirandola, R., Overhage, S.: Performance prediction of component-based systems \u2013 a survey from an engineering perspective. In: Reussner, R., Stafford, J.A., Ren, X.-M. (eds.) Architecting Systems with Trustworthy Components. LNCS, vol. 3938, pp. 169\u2013192. Springer, Heidelberg (2006)"},{"issue":"12","key":"16_CR13","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1002\/cpe.3226","volume":"26","author":"F Br\u00fcseke","year":"2014","unstructured":"Br\u00fcseke, F., Wachsmuth, H., Engels, G., Becker, S.: PBlaman: performance blame analysis based on Palladio contracts. Concurr. Comput. Pract. Exp. 26(12), 1975\u20132004 (2014)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"16_CR14","unstructured":"Chen, M.Y., Kiciman, E., Fratkin, E., Fox, A., Brewer, E.: Pinpoint: problem determination in large, dynamic internet services. In: International Conference on Dependable Systems and Networks, DSN 2002, Proceedings, pp. 595\u2013604 (2002)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-35873-9_13","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"J Christ","year":"2013","unstructured":"Christ, J., Ermis, E., Sch\u00e4f, M., Wies, T.: Flow-sensitive fault localization. In: Giacobazzi, R., Berdine, J., Mastroeni, I. (eds.) VMCAI 2013. LNCS, vol. 7737, pp. 189\u2013208. Springer, Heidelberg (2013)"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E Clarke","year":"2004","unstructured":"Clarke, E., Kroning, D., Lerda, F.: A tool for checking ANSI-C programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 168\u2013176. Springer, Heidelberg (2004)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Cleve, H., Zeller, A.: Locating causes of program failures. In: Proceedings of 27th International Conference on Software Engineering, ICSE 2005, pp. 342\u2013351. ACM (2005)","DOI":"10.1145\/1062455.1062522"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Crnkovic, I., Chaudron, M.R.V., Larsson, S.: Component-based development process and component lifecycle. In: ICSEA, p. 44. IEEE Computer Society (2006)","DOI":"10.1109\/ICSEA.2006.261300"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/11531142_23","volume-title":"ECOOP 2005 - Object-Oriented Programming","author":"V Dallmeier","year":"2005","unstructured":"Dallmeier, V., Lindig, C., Zeller, A.: Lightweight defect localization for Java. In: Gao, X.-X. (ed.) ECOOP 2005. LNCS, vol. 3586, pp. 528\u2013550. Springer, Heidelberg (2005)"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/978-3-319-08867-9_49","volume-title":"Computer Aided Verification","author":"B Dutertre","year":"2014","unstructured":"Dutertre, B.: Yices\u00a02.2. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 737\u2013744. Springer, Heidelberg (2014)"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-89020-1_2","volume-title":"Applications of Graph Transformations with Industrial Relevance","author":"G Engels","year":"2008","unstructured":"Engels, G., G\u00fcldali, B., Soltenborn, C., Wehrheim, H.: Assuring consistency of business process models and web services using visual contracts. In: Sch\u00fcrr, A., Nagl, M., Z\u00fcndorf, A. (eds.) AGTIVE 2007. LNCS, vol. 5088, pp. 17\u201331. Springer, Heidelberg (2008)"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-642-32759-9_17","volume-title":"FM 2012: Formal Methods","author":"E Ermis","year":"2012","unstructured":"Ermis, E., Sch\u00e4f, M., Wies, T.: Error invariants. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 187\u2013201. Springer, Heidelberg (2012)"},{"issue":"3","key":"16_CR23","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10009-005-0202-0","volume":"8","author":"A Groce","year":"2006","unstructured":"Groce, A., Chaki, S., Kroening, D., Strichman, O.: Error explanation with distance metrics. Int. J. Softw. Tools Technol. Transf. 8(3), 229\u2013247 (2006)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"2","key":"16_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.entcs.2004.12.023","volume":"119","author":"A Groce","year":"2005","unstructured":"Groce, A., Kroening, D.: Making the most of BMC counterexamples. Electron. Notes Theor. Comput. Sci. 119(2), 67\u201381 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"16_CR25","unstructured":"Hutchins, M., Foster, H., Goradia, T., Ostrand, T.: Experiments on the effectiveness of dataflow- and control-flow-based test adequacy criteria. In: 16th International Conference on Software Engineering, Proceedings, ICSE-16, pp. 191\u2013200 (1994)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J.: Empirical evaluation of the tarantula automatic fault-localization technique. In: Proceedings of 20th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2005, pp. 273\u2013282. ACM (2005)","DOI":"10.1145\/1101908.1101949"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J., Stasko, J.: Visualization of test information to assist fault localization. In: Proceedings of 24th International Conference on Software Engineering, ICSE 2002, pp. 467\u2013477. ACM (2002)","DOI":"10.1145\/581396.581397"},{"issue":"6","key":"16_CR28","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1145\/1993316.1993550","volume":"46","author":"M Jose","year":"2011","unstructured":"Jose, M., Majumdar, R.: Cause clue clauses: error localization using maximum satisfiability. SIGPLAN Not. 46(6), 437\u2013446 (2011)","journal-title":"SIGPLAN Not."},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Jose, M., Majumdar, R.: Cause clue clauses: error localization using maximum satisfiability. In: Proceedings of 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2011, pp. 437\u2013446. ACM (2011)","DOI":"10.1145\/1993498.1993550"},{"key":"16_CR30","unstructured":"K\u00f6nighofer, R., Bloem, R.: Automated error localization and correction for imperative programs. In: Proceedings of International Conference on Formal Methods in Computer-Aided Design, FMCAD 2011, pp. 91\u2013100. FMCAD Inc. (2011)"},{"issue":"3","key":"16_CR31","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/0020-0190(88)90054-3","volume":"29","author":"B Korel","year":"1988","unstructured":"Korel, B., Laski, J.: Dynamic program slicing. Inf. Process. Lett. 29(3), 155\u2013163 (1988)","journal-title":"Inf. Process. Lett."},{"key":"16_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-319-11737-9_17","volume-title":"Formal Methods and Software Engineering","author":"S-M Lamraoui","year":"2014","unstructured":"Lamraoui, S.-M., Nakajima, S.: A formula-based approach for automatic fault localization of imperative programs. In: Merz, S., Pang, J. (eds.) ICFEM 2014. LNCS, vol. 8829, pp. 251\u2013266. Springer, Heidelberg (2014)"},{"issue":"5","key":"16_CR33","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1145\/780822.781148","volume":"38","author":"B Liblit","year":"2003","unstructured":"Liblit, B., Aiken, A., Zheng, A.X., Jordan, M.I.: Bug isolation via remote program sampling. SIGPLAN Not. 38(5), 141\u2013154 (2003)","journal-title":"SIGPLAN Not."},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Liblit, B., Aiken, A., Zheng, A.X., Jordan, M.I.: Bug isolation via remote program sampling. In: Proceedings of ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, PLDI 2003, pp. 141\u2013154. ACM (2003)","DOI":"10.1145\/781131.781148"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Liblit, B., Naik, M., Zheng, A.X., Aiken, A., Jordan, M.I.: Scalable statistical bug isolation. In: Proceedings of 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005, pp. 15\u201326. ACM (2005)","DOI":"10.1145\/1065010.1065014"},{"issue":"6","key":"16_CR36","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1064978.1065014","volume":"40","author":"B Liblit","year":"2005","unstructured":"Liblit, B., Naik, M., Zheng, A.X., Aiken, A., Jordan, M.I.: Scalable statistical bug isolation. SIGPLAN Not. 40(6), 15\u201326 (2005)","journal-title":"SIGPLAN Not."},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Mao, C.: Slicing web service-based software. In: 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA), pp. 1\u20138 (2009)","DOI":"10.1109\/SOCA.2009.5410460"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Minamide, Y.: Static approximation of dynamically generated web pages. In: Proceedings of 14th International Conference on World Wide Web, WWW 2005, pp. 432\u2013441. ACM (2005)","DOI":"10.1145\/1060745.1060809"},{"key":"16_CR39","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.jss.2013.11.002","volume":"89","author":"R Mirandola","year":"2014","unstructured":"Mirandola, R., Potena, P., Riccobene, E., Scandurra, P.: A reliability model for service component architectures. J. Syst. Softw. 89, 109\u2013127 (2014)","journal-title":"J. Syst. Softw."},{"key":"16_CR40","unstructured":"OASIS. Web services business process execution language v2.0. \n                      http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/OS\/wsbpel-v2.0-OS.pdf"},{"key":"16_CR41","unstructured":"Renieres, M., Reiss, S.P.: Fault localization with nearest neighbor queries. In: 18th IEEE International Conference on Automated Software Engineering, Proceedings, pp. 30\u201339 (2003)"},{"key":"16_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/978-3-642-17322-6_23","volume-title":"Graph Transformations and Model-Driven Engineering","author":"W Sch\u00e4fer","year":"2010","unstructured":"Sch\u00e4fer, W., Wehrheim, H.: Model-driven development with Mechatronic UML. In: Engels, G., Lewerentz, C., Sch\u00e4fer, W., Sch\u00fcrr, A., Westfechtel, B. (eds.) Nagl Festschrift. LNCS, vol. 5765, pp. 533\u2013554. Springer, Heidelberg (2010)"},{"issue":"5","key":"16_CR43","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TSMC.1986.289308","volume":"16","author":"I Vessey","year":"1986","unstructured":"Vessey, I.: Expertise in debugging computer programs: an analysis of the content of verbal protocols. IEEE Trans. Syst. Man Cybern. 16(5), 621\u2013637 (1986)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Walther, S., Wehrheim, H.: Knowledge-based verification of service compositions - an smt approach. In: 2013 18th International Conference Engineering of Complex Computer Systems (ICECCS), pp. 24\u201332 (2013)","DOI":"10.1109\/ICECCS.2013.14"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Wassermann, G., Yu, D., Chander, A., Dhurjati, D., Inamura, H., Su, Z.: Dynamic test input generation for web applications. In: Proceedings of 2008 International Symposium on Software Testing and Analysis, ISSTA 2008, pp. 249\u2013260. ACM (2008)","DOI":"10.1145\/1390630.1390661"},{"key":"16_CR46","unstructured":"Weiser, M.: Program slicing. In: Proceedings of 5th International Conference on Software Engineering, ICSE 1981, pp. 439\u2013449. IEEE Press (1981)"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Wong, W.E., Debroy, V.: A survey of software fault localization. Technical report, The University of Texas at Dallas (2009)","DOI":"10.1081\/E-ESE-120044231"},{"issue":"4","key":"16_CR48","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.jlap.2012.03.002","volume":"81","author":"F Wotawa","year":"2012","unstructured":"Wotawa, F., Nica, M., Moraru, I.: Automated debugging based on a constraint model of the program and a test case. J. Logic Algebraic Program. 81(4), 390\u2013407 (2012). Special Issue: NWPT 2009Special Issue: NWPT 2009","journal-title":"J. Logic Algebraic Program."},{"key":"16_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/3-540-48166-4_16","volume-title":"Software Engineering - ESEC\/FSE \u201999","author":"A Zeller","year":"1999","unstructured":"Zeller, A.: Yesterday, my program worked. Today, it does not. Why? In: Wang, J., Lemoine, M. (eds.) ESEC 1999 and ESEC-FSE 1999. LNCS, vol. 1687, pp. 253\u2013267. Springer, Heidelberg (1999)"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Zeller, A.: Isolating cause-effect chains from computer programs. In: Proceedings of 10th ACM SIGSOFT Symposium on Foundations of Software Engineering, SIGSOFT 2002\/FSE-10, pp. 1\u201310. ACM (2002)","DOI":"10.1145\/587051.587053"},{"issue":"2","key":"16_CR51","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A Zeller","year":"2002","unstructured":"Zeller, A., Hildebrandt, R.: Simplifying and isolating failure-inducing input. IEEE Trans. Softw. Eng. 28(2), 183\u2013200 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR52","doi-asserted-by":"crossref","unstructured":"Zhang, X., He, H., Gupta, N., Gupta, R.: Experimental evaluation of using dynamic slices for fault location. In: Proceedings of Sixth International Symposium on Automated Analysis-driven Debugging, AADEBUG 2005, pp. 33\u201342. ACM (2005)","DOI":"10.1145\/1085130.1085135"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44482-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:04:20Z","timestamp":1598227460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44482-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319444819","9783319444826"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44482-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESOCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Service-Oriented and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esocc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}