{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:22:36Z","timestamp":1773951756848,"version":"3.50.1"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,3,15]],"date-time":"2016-03-15T00:00:00Z","timestamp":1458000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science and Technology, Executive Yuan, Taiwan","award":["MOST 102-2410-H-141-015-MY2"],"award-info":[{"award-number":["MOST 102-2410-H-141-015-MY2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2016,8,22]]},"abstract":"<jats:p>Log management and log auditing have become increasingly crucial for enterprises in this era of information and technology explosion. The log analysis technique is useful for discovering possible problems in business processes and preventing illegal-intrusion attempts and data-tampering attacks. Because of the complexity of the dynamically changing environment, auditing a tremendous number of data is a challenging issue. We provide a real-time audit mechanism to improve the aforementioned problems in log auditing. This mechanism was developed based on the Lempel-Ziv-Welch (LZW) compression technique to facilitate effective compression and provide reliable auditing log entries. The mechanism can be used to predict unusual activities when compressing the log data according to pre-defined auditing rules. Auditors using real-time and continuous monitoring can perceive instantly the most likely anomalies or exceptions that could cause problems. We also designed a user interface that allows auditors to define the various compression and audit parameters, using real log cases in the experiment to verify the feasibility and effectiveness of this proposed audit mechanism. In summary, this mechanism changes the log access method and improves the efficiency of log analysis. This mechanism greatly simplifies auditing so that auditors must only trace the sources and causes of the problems related to the detected anomalies. This greatly reduces the processing time of analytical audit procedures and the manual checking time, and improves the log audit efficiency.<\/jats:p>","DOI":"10.1145\/2629569","type":"journal-article","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T13:50:44Z","timestamp":1458309044000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Real-Time Audit Mechanism Based on the Compression Technique"],"prefix":"10.1145","volume":"7","author":[{"given":"Shing-Han","family":"Li","sequence":"first","affiliation":[{"name":"National Taipei University of Business, Taipei City, Taiwan"}]},{"given":"David C.","family":"Yen","sequence":"additional","affiliation":[{"name":"SUNY College at Oneonta, Oneonta, NY"}]},{"given":"Ying-Ping","family":"Chuang","sequence":"additional","affiliation":[{"name":"Tatung University, 3rd Section Taipei, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"502","article-title":"Improving LZW image compression","volume":"44","author":"Abu Taleb S. A.","year":"2010","unstructured":"S. A. Abu Taleb , H. M. J. Musafa , A. M. Khtoom , and K. Gharaybih . 2010 . Improving LZW image compression . European Journal of Scientific Research 44 , 3, 502 -- 509 . S. A. Abu Taleb, H. M. J. Musafa, A. M. Khtoom, and K. Gharaybih. 2010. Improving LZW image compression. European Journal of Scientific Research 44, 3, 502--509.","journal-title":"European Journal of Scientific Research"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2009.12"},{"key":"e_1_2_1_3_1","first-page":"73","article-title":"On security log management systems","volume":"10","author":"Al-Fedaghi S.","year":"2010","unstructured":"S. Al-Fedaghi and B. Mattar . 2010 . On security log management systems . Global Journal of Computer Science and Technology 10 , 6, 73 -- 82 . S. Al-Fedaghi and B. Mattar. 2010. On security log management systems. Global Journal of Computer Science and Technology 10, 6, 73--82.","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2205"},{"key":"e_1_2_1_5_1","first-page":"281","article-title":"Comparative study between various algorithms of data compression techniques","volume":"7","author":"Al-Laham M.","year":"2007","unstructured":"M. Al-Laham and M. M. El Emary . 2007 . Comparative study between various algorithms of data compression techniques . International Journal of Computer Science and Network Security 7 , 4, 281 -- 291 . M. Al-Laham and M. M. El Emary. 2007. Comparative study between various algorithms of data compression techniques. International Journal of Computer Science and Network Security 7, 4, 281--291.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2002.21.1.125"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.4301\/S1807-17752006000200007"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2005.10.004"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2008.22.2.195"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5120\/3097-4249"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 7th International ISCRAM Conference. 1--10","author":"Baksa R.","unstructured":"R. Baksa and M. Turoff . 2010. The current state of continuous auditing and emergency management's valuable contribution . In Proceedings of the 7th International ISCRAM Conference. 1--10 . R. Baksa and M. Turoff. 2010. The current state of continuous auditing and emergency management's valuable contribution. In Proceedings of the 7th International ISCRAM Conference. 1--10."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231852"},{"key":"e_1_2_1_13_1","first-page":"551","article-title":"The law of anomalous numbers","volume":"78","author":"Benford F.","year":"1938","unstructured":"F. Benford . 1938 . The law of anomalous numbers . Proceedings of the American Philosophical Society 78 , 4, 551 -- 572 . F. Benford. 1938. The law of anomalous numbers. Proceedings of the American Philosophical Society 78, 4, 551--572.","journal-title":"Proceedings of the American Philosophical Society"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27609-5_12"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 15th Annual Research Workshop on Artificial Intelligence and Emerging Technologies in Accounting, Auditing and Tax. 123--135","author":"Brown C. E.","unstructured":"C. E. Brown , J. A. Wong , and A. A. Baldwin . 2006. Research streams in continuous audit: A review and analysis of the existing literature . In Proceedings of the 15th Annual Research Workshop on Artificial Intelligence and Emerging Technologies in Accounting, Auditing and Tax. 123--135 . C. E. Brown, J. A. Wong, and A. A. Baldwin. 2006. Research streams in continuous audit: A review and analysis of the existing literature. In Proceedings of the 15th Annual Research Workshop on Artificial Intelligence and Emerging Technologies in Accounting, Auditing and Tax. 123--135."},{"key":"e_1_2_1_16_1","volume-title":"Research report","author":"Canadian Institute of Chartered Accountants and American Institute of Certified Public Accountants (CICA\/AICPA). 1999. Continuous Auditing","unstructured":"Canadian Institute of Chartered Accountants and American Institute of Certified Public Accountants (CICA\/AICPA). 1999. Continuous Auditing , Research report . Toronto, Canada : CICA. Canadian Institute of Chartered Accountants and American Institute of Certified Public Accountants (CICA\/AICPA). 1999. Continuous Auditing, Research report. Toronto, Canada: CICA."},{"key":"e_1_2_1_17_1","unstructured":"C. Carslaw. 1988. Anomalies in income numbers: Evidence of goal oriented behavior. The Accounting Review (April) 321--327.  C. Carslaw. 1988. Anomalies in income numbers: Evidence of goal oriented behavior. The Accounting Review (April) 321--327."},{"key":"e_1_2_1_18_1","first-page":"53","article-title":"Impact of SAS No. 94 on Computer Aided Audit Techniques","volume":"1","author":"Cerullo M. V.","year":"2003","unstructured":"M. V. Cerullo and M. J. Cerullo . 2003 . Impact of SAS No. 94 on Computer Aided Audit Techniques . Information Systems Control Journal 1 , 1, 53 -- 57 . M. V. Cerullo and M. J. Cerullo. 2003. Impact of SAS No. 94 on Computer Aided Audit Techniques. Information Systems Control Journal 1, 1, 53--57.","journal-title":"Information Systems Control Journal"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2011.01.001"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/1099-1123.00067"},{"key":"e_1_2_1_21_1","first-page":"17","article-title":"The effective use of benford's law to assist in detecting fraud in account data","volume":"5","author":"Durtschi C.","year":"2004","unstructured":"C. Durtschi , W. Hillison , and C. Pacini . 2004 . The effective use of benford's law to assist in detecting fraud in account data . Journal of Forensic Accounting 5 , 17 -- 34 . C. Durtschi, W. Hillison, and C. Pacini. 2004. The effective use of benford's law to assist in detecting fraud in account data. Journal of Forensic Accounting 5, 17--34.","journal-title":"Journal of Forensic Accounting"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.04.025"},{"key":"e_1_2_1_23_1","first-page":"57","article-title":"Storage optimization in cloud environment using compression algorithm","volume":"1","author":"Govinda K.","year":"2012","unstructured":"K. Govinda and Y. Kumar . 2012 . Storage optimization in cloud environment using compression algorithm . International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 1 , 1, 57 -- 61 . K. Govinda and Y. Kumar. 2012. Storage optimization in cloud environment using compression algorithm. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 1, 1, 57--61.","journal-title":"International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.123"},{"key":"e_1_2_1_25_1","first-page":"53","article-title":"Continuous auditing of database applications: An embedded audit module approach","volume":"3","author":"Groomer S. M.","year":"1989","unstructured":"S. M. Groomer and U. S. Murthy . 1989 . Continuous auditing of database applications: An embedded audit module approach . Journal of Information Systems 3 , 2, 53 -- 69 . S. M. Groomer and U. S. Murthy. 1989. Continuous auditing of database applications: An embedded audit module approach. Journal of Information Systems 3, 2, 53--69.","journal-title":"Journal of Information Systems"},{"key":"e_1_2_1_26_1","first-page":"66","article-title":"An evaluation of log file & compression mechanism","volume":"1","author":"Gupta R. K.","year":"2012","unstructured":"R. K. Gupta and R. Gupta . 2012 . An evaluation of log file & compression mechanism . International Journal of Advanced Research in Computer and Communication Engineering 1 , 2, 66 -- 71 . R. K. Gupta and R. Gupta. 2012. An evaluation of log file & compression mechanism. International Journal of Advanced Research in Computer and Communication Engineering 1, 2, 66--71.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the Information Theory and Applications Workshop. 202--206","author":"Han K. J.","unstructured":"K. J. Han and J. C. Kieffer . 2007. The challenges of intrusion detection compression technology . In Proceedings of the Information Theory and Applications Workshop. 202--206 . K. J. Han and J. C. Kieffer. 2007. The challenges of intrusion detection compression technology. In Proceedings of the Information Theory and Applications Workshop. 202--206."},{"key":"e_1_2_1_28_1","first-page":"51","article-title":"Continuous auditing from a practical perspective","volume":"2","author":"Handscombe K.","year":"2007","unstructured":"K. Handscombe . 2007 . Continuous auditing from a practical perspective . Information Systems Control Journal 2 , 51 -- 55 . K. Handscombe. 2007. Continuous auditing from a practical perspective. Information Systems Control Journal 2, 51--55.","journal-title":"Information Systems Control Journal"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.05.003"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"K. Kent and M. Souppaya. 2006. Guide to computer security log management. NIST Special Publication 800--892.  K. Kent and M. Souppaya. 2006. Guide to computer security log management. NIST Special Publication 800--892.","DOI":"10.6028\/NIST.SP.800-92"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.1999.13.2.87"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5120\/1444-1953"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5120\/7356-0273"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2308\/jeta.2006.3.1.61"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2010.24.1.91"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 28th Australasian Conference on Computer Science (ACSC\u201905)","author":"Leung K.","unstructured":"K. Leung and C. Leckie . 2005. Unsupervised anomaly detection in network intrusion detection using clusters . In Proceedings of the 28th Australasian Conference on Computer Science (ACSC\u201905) . 38, 1, 333--342. K. Leung and C. Leckie. 2005. Unsupervised anomaly detection in network intrusion detection using clusters. In Proceedings of the 28th Australasian Conference on Computer Science (ACSC\u201905). 38, 1, 333--342."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the Design, Automation and Test in Europe Conference. 76--81","author":"Lin C.","unstructured":"C. Lin , Y. Xie , and W. Wolf . 2004. LZQ-based code compression for VLIW embedded systems . In Proceedings of the Design, Automation and Test in Europe Conference. 76--81 . C. Lin, Y. Xie, and W. Wolf. 2004. LZQ-based code compression for VLIW embedded systems. In Proceedings of the Design, Automation and Test in Europe Conference. 76--81."},{"key":"e_1_2_1_38_1","first-page":"72","article-title":"A taxpayer compliance application of Benford's law","volume":"18","author":"Nigrini M.","year":"1996","unstructured":"M. Nigrini . 1996 . A taxpayer compliance application of Benford's law . The Journal of the American Taxation Association 18 , 1, 72 -- 91 . M. Nigrini. 1996. A taxpayer compliance application of Benford's law. The Journal of the American Taxation Association 18, 1, 72--91.","journal-title":"The Journal of the American Taxation Association"},{"key":"e_1_2_1_39_1","first-page":"52","article-title":"The use of Benford's law as an aid in analytical procedures","volume":"16","author":"Nigrini M. J.","year":"1997","unstructured":"M. J. Nigrini and L. J. Mittermaier . 1997 . The use of Benford's law as an aid in analytical procedures . Auditing: A Journal of Practice and Theory 16 , 2, 52 -- 67 . M. J. Nigrini and L. J. Mittermaier. 1997. The use of Benford's law as an aid in analytical procedures. Auditing: A Journal of Practice and Theory 16, 2, 52--67.","journal-title":"Auditing: A Journal of Practice and Theory"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5120\/6065-8193"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the SEDONA Conference. 3--6.","author":"Redgrave J.","unstructured":"J. Redgrave , P. Ashish , F. Jason , H. Ted , and R. Charles . 2005. The SEDONA principles: Best practices recommendations & principles for addressing electronic document production . In Proceedings of the SEDONA Conference. 3--6. J. Redgrave, P. Ashish, F. Jason, H. Ted, and R. Charles. 2005. The SEDONA principles: Best practices recommendations & principles for addressing electronic document production. In Proceedings of the SEDONA Conference. 3--6."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1981.220416"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1108\/02686900110385605"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2002.21.1.147"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/163090.163096"},{"key":"e_1_2_1_46_1","first-page":"1","article-title":"Continuous auditing through leveraging technology","volume":"2","author":"Sarva S.","year":"2006","unstructured":"S. Sarva . 2006 . Continuous auditing through leveraging technology . ISACA Journal Online 2 , 1, 1 -- 4 . S. Sarva. 2006. Continuous auditing through leveraging technology. ISACA Journal Online 2, 1, 1--4.","journal-title":"ISACA Journal Online"},{"key":"e_1_2_1_47_1","first-page":"39","article-title":"Non-stop auditing","volume":"131","author":"Shields G.","year":"1998","unstructured":"G. Shields . 1998 . Non-stop auditing . CA Magazine 131 , 7, 39 -- 40 . G. Shields. 1998. Non-stop auditing. CA Magazine 131, 7, 39--40.","journal-title":"CA Magazine"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5120\/953-1330"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-006-9496-5"},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of 11th East-European Conference on Advances in Databases and Information Systems (ADBIS). 330--342","author":"Skibi\u0144ski P.","unstructured":"P. Skibi\u0144ski and J. Swacha . 2007. Fast and efficient log file compression . In Proceedings of 11th East-European Conference on Advances in Databases and Information Systems (ADBIS). 330--342 . P. Skibi\u0144ski and J. Swacha. 2007. Fast and efficient log file compression. In Proceedings of 11th East-European Conference on Advances in Databases and Information Systems (ADBIS). 330--342."},{"key":"e_1_2_1_51_1","first-page":"11","article-title":"Classifying the network intrusion attacks using data mining classification methods and their performance comparison","volume":"9","author":"Srinivasulu P.","year":"2009","unstructured":"P. Srinivasulu , D. Nagaraju , P. R. Kumar , and K. N. Rao . 2009 . Classifying the network intrusion attacks using data mining classification methods and their performance comparison . International Journal of Computer Science and Network Security (IJCSNS) 9 , 6, 11 -- 18 . P. Srinivasulu, D. Nagaraju, P. R. Kumar, and K. N. Rao. 2009. Classifying the network intrusion attacks using data mining classification methods and their performance comparison. International Journal of Computer Science and Network Security (IJCSNS) 9, 6, 11--18.","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"e_1_2_1_52_1","first-page":"327","article-title":"Identifying user behavior by analyzing web server access log file","volume":"9","author":"Suneetha K. R.","year":"2009","unstructured":"K. R. Suneetha and R. Krishnamoorthi . 2009 . Identifying user behavior by analyzing web server access log file . International Journal of Computer Science and Network Security (IJCSNS) 9 , 4, 327 -- 332 . K. R. Suneetha and R. Krishnamoorthi. 2009. Identifying user behavior by analyzing web server access log file. International Journal of Computer Science and Network Security (IJCSNS) 9, 4, 327--332.","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"e_1_2_1_53_1","unstructured":"J. Thomas. 1989. Unusual patterns in reported earnings. The Accounting Review (October) 773--787.  J. Thomas. 1989. Unusual patterns in reported earnings. The Accounting Review (October) 773--787."},{"key":"e_1_2_1_54_1","volume-title":"Business Process Management Workshops. Springer, Berlin Heidelberg, 158--169","author":"van Dongen B. F.","unstructured":"B. F. van Dongen and A. Adriansyah . 2009. Process mining: fuzzy clustering and performance visualization . In Business Process Management Workshops. Springer, Berlin Heidelberg, 158--169 . B. F. van Dongen and A. Adriansyah. 2009. Process mining: fuzzy clustering and performance visualization. In Business Process Management Workshops. Springer, Berlin Heidelberg, 158--169."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.09.001"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229156.2229157"},{"key":"e_1_2_1_57_1","first-page":"110","article-title":"The continuous audit of online systems","volume":"10","author":"Vasarhelyi M. A.","year":"1991","unstructured":"M. A. Vasarhelyi and F. B. Halper . 1991 . The continuous audit of online systems . Auditing: A Journal of Practice and Theory 10 , 1, 110 -- 125 . M. A. Vasarhelyi and F. B. Halper. 1991. The continuous audit of online systems. Auditing: A Journal of Practice and Theory 10, 1, 110--125.","journal-title":"Auditing: A Journal of Practice and Theory"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.2308\/jeta.2004.1.1.1"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-007-0052-1"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659158"},{"key":"e_1_2_1_61_1","doi-asserted-by":"crossref","unstructured":"A. Wespi M. Dacier and H. Debar. 2000. Intrusion detection using variable-length audit trail patterns. In Recent Advances in Intrusion Detection. Springer Berlin Heidelberg 110--129.   A. Wespi M. Dacier and H. Debar. 2000. Intrusion detection using variable-length audit trail patterns. In Recent Advances in Intrusion Detection. Springer Berlin Heidelberg 110--129.","DOI":"10.1007\/3-540-39945-3_8"},{"key":"e_1_2_1_62_1","first-page":"6","article-title":"Does internal control enhance or impede","volume":"86","author":"White L.","year":"2005","unstructured":"L. White . 2005 . Does internal control enhance or impede . Strategic Finance 86 , 8, 6 -- 7 . L. White. 2005. Does internal control enhance or impede. Strategic Finance 86, 8, 6--7.","journal-title":"Strategic Finance"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2607(94)90097-3"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629569","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2629569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:29Z","timestamp":1750227209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,15]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,8,22]]}},"alternative-id":["10.1145\/2629569"],"URL":"https:\/\/doi.org\/10.1145\/2629569","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,15]]},"assertion":[{"value":"2013-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}