{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:23Z","timestamp":1740123563536,"version":"3.37.3"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T00:00:00Z","timestamp":1601078400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T00:00:00Z","timestamp":1601078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s10836-020-05904-2","type":"journal-article","created":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T10:02:44Z","timestamp":1601114564000},"page":"643-663","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Formal Verification of ECCs for Memories Using ACL2"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3096-9536","authenticated-orcid":false,"given":"Mahum","family":"Naseer","sequence":"first","affiliation":[]},{"given":"Waqar","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Osman","family":"Hasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,26]]},"reference":[{"key":"5904_CR1","doi-asserted-by":"crossref","unstructured":"Affeldt R, Garrigue J (2015) Formalization of Error-Correcting codes: from hamming to modern coding theory. In: Urban C, Zhang X (eds) Proceedings of International conference on interactive theorem proving. Springer, LNCS, vol 9236, pp 17\u201333","DOI":"10.1007\/978-3-319-22102-1_2"},{"key":"5904_CR2","first-page":"76","volume":"61","author":"R Affeldt","year":"2015","unstructured":"Affeldt R, Garrigue J (2015) Formalization of Error-Correcting Codes using SSReflect. MI Lect Note Ser 61:76\u201378","journal-title":"MI Lect Note Ser"},{"key":"5904_CR3","unstructured":"Affeldt R, Garrigue J, Saikawa T (2016) Formalization of Reed-Solomon Codes and progress report on Formalization of LDPC Codes. In: Proceedings of International Symposium on Information Theory and Its Applications. IEEE, pp 532\u2013536"},{"key":"5904_CR4","doi-asserted-by":"crossref","unstructured":"Affeldt R, Garrigue J, Saikawa T (2020) A library for formalization of linear Error-Correcting codes. Journal of Automated Reasoning, pp 1\u201342","DOI":"10.1007\/s10817-019-09538-8"},{"key":"5904_CR5","doi-asserted-by":"crossref","unstructured":"Arbel E, Koyfman S, Kudva P, Moran S (2014) Automated detection and verification of parity-protected memory elements. In: Proceedings of International Conference on Computer-Aided Design. IEEE, pp 1\u20138","DOI":"10.1109\/ICCAD.2014.7001322"},{"issue":"3","key":"5904_CR6","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TVLSI.2009.2036362","volume":"19","author":"C Argyrides","year":"2011","unstructured":"Argyrides C, Pradhan D K, Kocak T (2011) Matrix codes for reliable and cost efficient memory chips. Trans VLSI Syst 19(3):420\u2013428","journal-title":"Trans VLSI Syst"},{"issue":"4","key":"5904_CR7","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/TNS.2010.2043265","volume":"57","author":"CA Argyrides","year":"2010","unstructured":"Argyrides C A, Reviriego P, Pradhan D K, Maestro J A (2010) Matrix-Based Codes for adjacent error correction. Trans Nuclear Sci 57(4):2106\u20132111","journal-title":"Trans Nuclear Sci"},{"issue":"2","key":"5904_CR8","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10703-011-0121-5","volume":"39","author":"S Baarir","year":"2011","unstructured":"Baarir S, Braunstein C, Encrenaz E, Ili\u00e9 J M, Mounier I, Poitrenaud D, Younes S (2011) Feasibility analysis for robustness quantification by symbolic model checking. Formal Methods Syst Des 39(2):165\u2013184","journal-title":"Formal Methods Syst Des"},{"issue":"1,2","key":"5904_CR9","first-page":"1","volume":"39","author":"C Ballarin","year":"1999","unstructured":"Ballarin C, Paulson L C (1999) A Pragmatic Approach to Extending Provers by Computer Algebra\u2014with Applications to Coding Theory. Fund Inf 39(1,2):1\u201320","journal-title":"Fund Inf"},{"issue":"3","key":"5904_CR10","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/MDT.2005.69","volume":"22","author":"R Baumann","year":"2005","unstructured":"Baumann R (2005) Soft errors in advanced computer systems. Des Test Comput 22(3):258\u2013266. https:\/\/doi.org\/10.1109\/MDT.2005.69","journal-title":"Des Test Comput"},{"key":"5904_CR11","unstructured":"Berrou C, Glavieux A, Thitimajshima P (1993) Near Shannon limit error-correcting coding and decoding: Turbo-codes 1 In: Proceedings of International conference on communications, vol vol 2. IEEE, pp 1064\u20131070"},{"issue":"6","key":"5904_CR12","doi-asserted-by":"publisher","first-page":"2675","DOI":"10.1109\/TNS.1975.4328188","volume":"22","author":"D Binder","year":"1975","unstructured":"Binder D, Smith E C, Holman A B (1975) Satellite anomalies from galactic cosmic rays. Trans Nuclear Sci 22(6):2675\u20132680. https:\/\/doi.org\/10.1109\/TNS.1975.4328188","journal-title":"Trans Nuclear Sci"},{"issue":"9","key":"5904_CR13","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/12.537122","volume":"45","author":"B Bollig","year":"1996","unstructured":"Bollig B, Wegener I (1996) Improving the variable ordering of OBDDs is NP-complete. Trans Comput 45(9):993\u20131002","journal-title":"Trans Comput"},{"key":"5904_CR14","doi-asserted-by":"crossref","unstructured":"Boyer R S, Goldschlag D M, Kaufmann M, Moore J S (1991) Functional instantiation in First-Order logic. Academic Press, pp 7\u201326","DOI":"10.1016\/B978-0-12-450010-5.50007-4"},{"key":"5904_CR15","doi-asserted-by":"crossref","unstructured":"Burlyaev D, Fradet P, Girault A (2014) Verification-guided voter minimization in triple-modular redundant circuits. In: Proceedings of Design, Automation & Test in Europe Conference & Exhibition. IEEE, pp 1\u20136","DOI":"10.7873\/DATE.2014.105"},{"key":"5904_CR16","doi-asserted-by":"crossref","unstructured":"Cabodi G, Murciano M (2006) BDD-based Hardware Verification. In: Proceedings of International conference on formal methods for the design of computer, Communication, and Software Systems. Springer, pp 78\u2013107","DOI":"10.1007\/11757283_4"},{"key":"5904_CR17","doi-asserted-by":"crossref","unstructured":"Can B, Yomo H, De Carvalho E (2006) Hybrid Forwarding Scheme for Cooperative Relaying in OFDM based Networks. In: Proceedings of International conference on communications, vol 10, IEEE, pp 4520\u20134525","DOI":"10.1109\/ICC.2006.255351"},{"key":"5904_CR18","doi-asserted-by":"crossref","unstructured":"Clarke E M (1997) Model checking. In: Proceedings of International Conference on Foundations of Software Technology and Theoretical Computer Science. Springer, pp 54\u201356","DOI":"10.1007\/BFb0058022"},{"issue":"4","key":"5904_CR19","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/242223.242257","volume":"28","author":"EM Clarke","year":"1996","unstructured":"Clarke E M, Wing J M (1996) Formal methods: State of the art and future directions. Comput Surv 28(4):626\u2013643","journal-title":"Comput Surv"},{"issue":"2","key":"5904_CR20","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1023\/A:1011125927317","volume":"17","author":"E Cota","year":"2001","unstructured":"Cota E, Lima F, Rezgui S, Carro L, Velazco R, Lubaszewski M, Reis R (2001) Synthesis of an 8051-Like Micro-Controller tolerant to transient faults. J Electron Test 17(2):149\u2013161","journal-title":"J Electron Test"},{"key":"5904_CR21","doi-asserted-by":"crossref","unstructured":"Das A, Touba NA (2018) Low Complexity Burst Error Correcting Codes to Correct MBUs in SRAMs. In: Proceedings of Great Lakes Symposium on VLSI. ACM, pp 219\u2013224","DOI":"10.1145\/3194554.3194570"},{"key":"5904_CR22","doi-asserted-by":"crossref","unstructured":"Davis J (2006) Memories: Array-like records for ACL2. In: Proceedings International workshop on the ACL2 theorem prover and its applications. ACM, pp 57\u201360","DOI":"10.1145\/1217975.1217986"},{"issue":"8","key":"5904_CR23","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/TCAD.2011.2120950","volume":"30","author":"G Fey","year":"2011","unstructured":"Fey G, Sulflow A, Frehse S, Drechsler R (2011) Effective robustness analysis using bounded model checking techniques. Trans Comput-Aided Des Integr Circ Syst 30(8):1239\u2013 1252","journal-title":"Trans Comput-Aided Des Integr Circ Syst"},{"key":"5904_CR24","doi-asserted-by":"crossref","unstructured":"Frehse S, Fey G, Suflow A, Drechsler R (2009) Robustness Check for Multiple Faults using Formal Techniques. In: Proceedings of Euromicro conference on digital system design, architectures, Methods and Tools. IEEE, pp 85\u201390","DOI":"10.1109\/DSD.2009.218"},{"key":"5904_CR25","doi-asserted-by":"crossref","unstructured":"Frigerio L, Radaelli M A, Salice F (2008) Convolutional Coding for SEU mitigation In: Proceedings of European Test Symposium. IEEE, pp 191\u2013196","DOI":"10.1109\/ETS.2008.32"},{"key":"5904_CR26","unstructured":"Hagiwara M, Nakano K, Kong J (2016) Formalization of Coding Theory using Lean In: Proceedings of International Symposium on Information Theory and Its Applications. IEEE, pp 522\u2013526"},{"issue":"2","key":"5904_CR27","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming R W (1950) Error detecting and error correcting codes. Bell Syst Techn J 29(2):147\u2013160","journal-title":"Bell Syst Techn J"},{"issue":"9","key":"5904_CR28","doi-asserted-by":"publisher","first-page":"1580","DOI":"10.1109\/TCAD.2017.2682639","volume":"36","author":"H Han","year":"2017","unstructured":"Han H, Touba N A, Yang J S (2017) Exploiting unused spare columns and replaced columns to enhance memory ECC. Trans Comput-Aided Des Integr Circ Syst 36(9):1580\u20131591","journal-title":"Trans Comput-Aided Des Integr Circ Syst"},{"key":"5904_CR29","doi-asserted-by":"crossref","unstructured":"Hasan O, Tahar S (2015) Formal verification methods In: Encyclopedia of information science and technology, 3 edn. IGI Global, pp 7162\u20137170","DOI":"10.4018\/978-1-4666-5888-2.ch705"},{"key":"5904_CR30","doi-asserted-by":"crossref","unstructured":"Hentschke R, Marques F, Lima F, Carro L, Susin A, Reis R (2002) Analyzing area and performance penalty of protecting different digital modules with hamming code and triple modular redundancy. In: Proceedings of Integrated Circuits and Systems Design. IEEE, pp 95\u2013100","DOI":"10.1109\/SBCCI.2002.1137643"},{"key":"5904_CR31","doi-asserted-by":"crossref","unstructured":"H\u00f6ller A, Kajtazovic N, Preschern C, Kreiner C (2014) Formal fault tolerance analysis of algorithms for redundant systems in early design stages. In: Proceedings of Software Engineering for Resilient Systems. Springer, pp 71\u201385","DOI":"10.1007\/978-3-319-12241-0_6"},{"issue":"4","key":"5904_CR32","first-page":"395","volume":"14","author":"MY Hsiao","year":"1970","unstructured":"Hsiao M Y (1970) A class of optimal minimum Odd-Weight-Column SEC-DED codes. J Res Dev 14(4):395\u2013401","journal-title":"J Res Dev"},{"key":"5904_CR33","unstructured":"Hussein J, Swift G (2015) Mitigating Single-Event Upsets Xilinx White Paper (WP395)(v1. 1). Available at: https:\/\/www.xilinx.com\/support\/documentation\/white_papers\/wp395-Mitigating-SEUs.pdf"},{"key":"5904_CR34","unstructured":"Isabelle Theorem Prover (2020) Available at: https:\/\/isabelle.in.tum.de\/"},{"issue":"4","key":"5904_CR35","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TC.2010.12","volume":"59","author":"JHR Jiang","year":"2010","unstructured":"Jiang J H R, Lee C C, Mishchenko A, Huang C Y (2010) To SAT or not to SAT: Scalable exploration of functional dependency. Trans Comput 59(4):457\u2013467","journal-title":"Trans Comput"},{"key":"5904_CR36","unstructured":"Kaufmann M, Sumners R (2002) Efficient Rewriting of Operations on Finite Structures in ACL2"},{"key":"5904_CR37","doi-asserted-by":"crossref","unstructured":"Kaufmann M, Moore J S, Manolios P (2000) Computer-Aided Reasoning: An Approach. Kluwer Academic Publishers","DOI":"10.1007\/978-1-4615-4449-4"},{"issue":"1","key":"5904_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jal.2007.07.002","volume":"7","author":"M Kaufmann","year":"2009","unstructured":"Kaufmann M, Moore J S, Ray S, Reeber E (2009) Integrating external deduction tools with ACL2. J Appl Log 7(1):3\u201325","journal-title":"J Appl Log"},{"key":"5904_CR39","doi-asserted-by":"publisher","unstructured":"Kchaou A, Youssef W E H, Tourki R, Bouesse F, Ramos P, Velazco R (2016) A deep analysis of SEU consequences in the internal memory of LEON3 processor. In: Proceedings of Latin-American Test Symposium. IEEE, pp 178\u2013178. https:\/\/doi.org\/10.1109\/LATW.2016.7483358","DOI":"10.1109\/LATW.2016.7483358"},{"key":"5904_CR40","doi-asserted-by":"crossref","unstructured":"Kong J, Webb D J, Hagiwara M (2018) Formalization of insertion\/deletion codes and the Levenshtein metric in lean. In: Proceedings of Information Theory and Its Applications. IEEE, pp 11\u201315","DOI":"10.23919\/ISITA.2018.8664354"},{"key":"5904_CR41","doi-asserted-by":"publisher","unstructured":"Krautz U, Pflanz M, Jacobi C, Tast H W, Weber K, Vierhaus H T (2006) Evaluating Coverage of Error Detection Logic for Soft Errors using Formal Methods. In: Proceedings of Design automation & test in europe conference, vol 1. IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/DATE.2006.244062","DOI":"10.1109\/DATE.2006.244062"},{"key":"5904_CR42","unstructured":"Lean Theorem Prover (2020) Available at: https:\/\/leanprover.github.io\/"},{"key":"5904_CR43","doi-asserted-by":"crossref","unstructured":"Leveugle R (2005) A new approach for early dependability evaluation based on formal property checking and controlled mutations. In: Proceedings of International On-Line Testing Symposium. IEEE, pp 260\u2013265","DOI":"10.1109\/IOLTS.2005.8"},{"key":"5904_CR44","unstructured":"Lin S, Costello D J (1983) Coding for reliable digital transmission and storage. Prentice-Hall, chap 1, pp 1\u201314"},{"key":"5904_CR45","unstructured":"Lin S, Costello DJ (1983b) Error Control Codin: Fundamentals and Applications. Pearson-Prentice Hall"},{"key":"5904_CR46","unstructured":"Lvov A, Lastras-Montano L A, Paruthi V, Shadowen R, El-zein A (2012) Formal verification of error correcting circuits using computational algebraic geometry. In: Proceedings of Formal Methods in Computer-Aided Design. IEEE, pp 141\u2013148"},{"issue":"1","key":"5904_CR47","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/T-ED.1979.19370","volume":"26","author":"TC May","year":"1979","unstructured":"May T C, Woods M H (1979) Alpha-Particle-Induced Soft errors in dynamic memories. Trans Electron Dev 26(1):2\u20139. https:\/\/doi.org\/10.1109\/T-ED.1979.19370","journal-title":"Trans Electron Dev"},{"key":"5904_CR48","doi-asserted-by":"crossref","unstructured":"Nicolaidis M (1999) Time redundancy based soft-error tolerance to rescue nanometer technologies. In: Proceedings VLSI Test Symposium. IEEE, pp 86\u201394","DOI":"10.1109\/VTEST.1999.766651"},{"key":"5904_CR49","doi-asserted-by":"publisher","unstructured":"Pierre L, Clavel R, Leveugle R (2009) ACL2 for the Verification of Fault-tolerance Properties: First Results. In: Proceedings of International Workshop on the ACL2 Theorem Prover and Its Applications. ACM, pp 90\u201399, https:\/\/doi.org\/10.1145\/1637837.1637852","DOI":"10.1145\/1637837.1637852"},{"key":"5904_CR50","unstructured":"Radke W H (2011) Fault-tolerant non-volatile integrated circuit memory. US Patent 8,046,542"},{"key":"5904_CR51","doi-asserted-by":"crossref","unstructured":"Rastogi A, Agarawal M, Gupta B (2009) SEU Mitigation-using 1\/3 Rate Convolution Coding. In: Proceedings of International Conference on Computer Science and Information Technology. IEEE, pp 180\u2013183","DOI":"10.1109\/ICCSIT.2009.5234740"},{"issue":"2","key":"5904_CR52","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TDMR.2012.2186965","volume":"12","author":"A Sanchez-Macian","year":"2012","unstructured":"Sanchez-Macian A, Reviriego P, Maestro J A (2012) Enhanced detection of double and triple adjacent errors in hamming codes through selective bit placement. Trans Device Mater Reliab 12(2):357\u2013362","journal-title":"Trans Device Mater Reliab"},{"issue":"1","key":"5904_CR53","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TDMR.2012.2204753","volume":"14","author":"A Sanchez-Macian","year":"2014","unstructured":"Sanchez-Macian A, Reviriego P, Maestro J A (2014) Hamming SEC-DAED and extended hamming SEC-DED-TAED codes through selective shortening and bit placement. Trans Device Mater Reliab 14 (1):574\u2013576","journal-title":"Trans Device Mater Reliab"},{"issue":"11","key":"5904_CR54","first-page":"1933","volume":"63","author":"A S\u00e1nchez-Maci\u00e1n","year":"2016","unstructured":"S\u00e1nchez-Maci\u00e1n A, Reviriego P, Maestro J A (2016) Combined SEU and SEFI Protection for Memories using Orthogonal Latin Square Codes. Trans Circ Syst I: Reg Papers 63(11):1933\u20131943","journal-title":"Trans Circ Syst I: Reg Papers"},{"key":"5904_CR55","doi-asserted-by":"crossref","unstructured":"Seshia S A, Li W, Mitra S (2007) Verification-guided Soft Error Resilience. In: Proceedings of Design, Automation & Test in Europe Conference & Exhibition. IEEE, pp 1\u20136","DOI":"10.1109\/DATE.2007.364501"},{"issue":"3","key":"5904_CR56","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TDMR.2005.856487","volume":"5","author":"CW Slayman","year":"2005","unstructured":"Slayman C W (2005) Cache and memory error detection, correction, and reduction techniques for terrestrial servers and workstations. Trans Device Mater Reliab 5(3):397\u2013404. https:\/\/doi.org\/10.1109\/TDMR.2005.856487","journal-title":"Trans Device Mater Reliab"},{"key":"5904_CR57","unstructured":"Verifi-ECC (2020) Available at: https:\/\/github.com\/Mahum123\/Verifi-ECC.git"},{"issue":"5","key":"5904_CR58","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1109\/TCOM.1971.1090700","volume":"19","author":"A Viterbi","year":"1971","unstructured":"Viterbi A (1971) Convolutional Codes and their Performance in Communication Systems. Trans Commun Technol 19(5):751\u2013772","journal-title":"Trans Commun Technol"},{"issue":"5","key":"5904_CR59","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.jss.2009.11.709","volume":"83","author":"P Zhang","year":"2010","unstructured":"Zhang P, Muccini H, Li B (2010) A classification and comparison of model checking software architecture techniques. J Syst Softw 83(5):723\u2013744","journal-title":"J Syst Softw"},{"issue":"1","key":"5904_CR60","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1147\/rd.401.0003","volume":"40","author":"JF Ziegler","year":"1996","unstructured":"Ziegler J F, Curtis H W, Muhlfeld H P, Montrose C J, Chin B, Nicewicz M, Russell C A, Wang W Y, Freeman L B, Hosier P, LaFave L E, Walsh J L, Orro J M, Unger G J, Ross J M, O\u2019Gorman T J, Messina B, Sullivan T D, Sykes A J, Yourke H, Enger T A, Tolat V, Scott T S, Taber A H, Sussman R J, Klein W A, Wahaus C W (1996) IBM Experiments in soft fails in computer electronics (1978\u20141994). IBM J Res Dev 40(1):3\u201318. https:\/\/doi.org\/10.1147\/rd.401.0003","journal-title":"IBM J Res Dev"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-020-05904-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-020-05904-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-020-05904-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T23:10:25Z","timestamp":1632611425000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-020-05904-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,26]]},"references-count":60,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["5904"],"URL":"https:\/\/doi.org\/10.1007\/s10836-020-05904-2","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2020,9,26]]},"assertion":[{"value":"12 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}