{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T10:42:32Z","timestamp":1773484952999,"version":"3.50.1"},"reference-count":90,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T00:00:00Z","timestamp":1493251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Italian project SHELL","award":["CTN01 00128 111357"],"award-info":[{"award-number":["CTN01 00128 111357"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2017,4,30]]},"abstract":"<jats:p>\n            Research on the Internet of Things (IoT) has devoted many efforts to technological aspects. Little social and practical benefits have emerged so far. IoT devices, so-called\n            <jats:italic>smart objects<\/jats:italic>\n            , are becoming even more pervasive and social, leading to the need to provide non-technical users with innovative interaction strategies for controlling their behavior. In other words, the opportunities offered by IoT can be amplified if new approaches are conceived to enable non-technical users to be directly involved in \u201ccomposing\u201d their smart objects by synchronizing their behavior. To fulfill this goal, this article introduces a model that includes new operators for defining rules combining multiple events and conditions exposed by smart objects, and for defining temporal and spatial constraints on rule activation. The article also presents the results of an elicitation study that was conducted to identify possible visual paradigms for expressing composition rules. Prototypes implementing the resulting visual paradigms were compared during a controlled experiment and the one that resulted most relevant for our goals was used in a study that involved home-automation experts. Finally, the article discusses some design implications that came out from the performed studies and presents the architecture of a platform supporting rule definition and execution.\n          <\/jats:p>","DOI":"10.1145\/3057859","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T12:38:23Z","timestamp":1493383103000},"page":"1-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":141,"title":["Empowering End Users to Customize their Smart Environments"],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9894-2116","authenticated-orcid":false,"given":"Giuseppe","family":"Desolda","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Bari Aldo Moro, Bari (Italy)"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8993-9855","authenticated-orcid":false,"given":"Carmelo","family":"Ardito","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Bari Aldo Moro, Bari (Italy)"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0552-8624","authenticated-orcid":false,"given":"Maristella","family":"Matera","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano (Italy)"}]}],"member":"320","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"Apiant Inc. 2016. We wired web. Retrieved from https:\/\/wewiredweb.com\/.  Apiant Inc. 2016. We wired web. Retrieved from https:\/\/wewiredweb.com\/."},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2014.10.018"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2011.11.005"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2014.01.003"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598153.2598201"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2399016.2399029"},{"key":"e_1_2_2_7_1","unstructured":"Atooma. 2016. Atooma mobile app. Retrieved from https:\/\/www.atooma.com\/.  Atooma. 2016. Atooma mobile app. Retrieved from https:\/\/www.atooma.com\/."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310802205776"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835587.2835589"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18425-8_2"},{"key":"e_1_2_2_12_1","volume-title":"Adjunt Proceedings of the Conference on Ubiquitous Computing (UbiComp\u201903)","author":"Beckmann C.","year":"2003","unstructured":"C. Beckmann and A. Dey . 2003. Siteview: Tangibly programming active environments with predictive visualization . In Adjunt Proceedings of the Conference on Ubiquitous Computing (UbiComp\u201903) . 167--168. Available at: http:\/\/www.ubicomp.org\/ubicomp 2003 \/adjunct_proceedings\/proceedings.pdf. C. Beckmann and A. Dey. 2003. Siteview: Tangibly programming active environments with predictive visualization. In Adjunt Proceedings of the Conference on Ubiquitous Computing (UbiComp\u201903). 167--168. Available at: http:\/\/www.ubicomp.org\/ubicomp2003\/adjunct_proceedings\/proceedings.pdf."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598153.2600035"},{"key":"e_1_2_2_14_1","volume-title":"Proceedings of the International Conference on Tangible, Embedded and Embodied Interaction (TEI\u201914)","author":"Bellucci A.","unstructured":"A. Bellucci , P. D\u00edaz , I. Aedo , and A. Malizia . 2014b. Prototyping device ecologies: physical to digital and viceversa . In Proceedings of the International Conference on Tangible, Embedded and Embodied Interaction (TEI\u201914) . ACM, New York, NY, 373--376. A. Bellucci, P. D\u00edaz, I. Aedo, and A. Malizia. 2014b. Prototyping device ecologies: physical to digital and viceversa. In Proceedings of the International Conference on Tangible, Embedded and Embodied Interaction (TEI\u201914). ACM, New York, NY, 373--376."},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2012.6402318"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.09.011"},{"key":"e_1_2_2_17_1","doi-asserted-by":"crossref","unstructured":"V. Braun and V. Clarke. 2006a. Using thematic analysis Psychology Qualitative Research in Psychology 3 2 77--101.  V. Braun and V. Clarke. 2006a. Using thematic analysis Psychology Qualitative Research in Psychology 3 2 77--101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"issue":"194","key":"e_1_2_2_19_1","first-page":"4","article-title":"SUS-A quick and dirty usability scale","volume":"189","author":"Brooke J.","year":"1996","unstructured":"J. Brooke . 1996 . SUS-A quick and dirty usability scale . Usability Evaluation in Industry 189 ( 194 ), 4 -- 7 . J. Brooke. 1996. SUS-A quick and dirty usability scale. Usability Evaluation in Industry 189(194), 4--7.","journal-title":"Usability Evaluation in Industry"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2817912.2817913"},{"key":"e_1_2_2_21_1","volume-title":"Proceedings of the Workshop on End User Development in the Internet of Things Era - CHI\u201915 (EUDITE\u201915)","author":"Burnett M.","unstructured":"M. Burnett and T. Kulesza . 2015. End-user development in internet of things: We the people . In Proceedings of the Workshop on End User Development in the Internet of Things Era - CHI\u201915 (EUDITE\u201915) . M. Burnett and T. Kulesza. 2015. End-user development in internet of things: We the people. In Proceedings of the Workshop on End User Development in the Internet of Things Era - CHI\u201915 (EUDITE\u201915)."},{"issue":"248","key":"e_1_2_2_22_1","first-page":"1","article-title":"Rule-based tools for the configuration of ambient intelligence systems: A comparative user study","volume":"75","author":"Cabitza F.","year":"2016","unstructured":"F. Cabitza , D. Fogli , R. Lanzilotti , and A. Piccinno . 2016 . Rule-based tools for the configuration of ambient intelligence systems: A comparative user study . Multimedia Tools and Applications 75 ( 248 ), 1 -- 21 . F. Cabitza, D. Fogli, R. Lanzilotti, and A. Piccinno. 2016. Rule-based tools for the configuration of ambient intelligence systems: A comparative user study. Multimedia Tools and Applications 75(248), 1--21.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_2_2_23_1","doi-asserted-by":"crossref","unstructured":"F.\n      Cabitza D.\n      Fogli and \n      A.\n      Piccinno\n  . \n  2014\n  a. \u201cEach to his own\u201d: Distinguishing activities roles and artifacts in EUD practices. In Smart Organizations and Smart Artifacts Lecture Notes in Information Systems and Organisation Vol. \n  7 Cham L. Caporarello B. Di Martino and M. Martinez (Eds.). \n  Springer 193--205.  F. Cabitza D. Fogli and A. Piccinno. 2014a. \u201cEach to his own\u201d: Distinguishing activities roles and artifacts in EUD practices. In Smart Organizations and Smart Artifacts Lecture Notes in Information Systems and Organisation Vol. 7 Cham L. Caporarello B. Di Martino and M. Martinez (Eds.). Springer 193--205.","DOI":"10.1007\/978-3-319-07040-7_19"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2014.10.014"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2735632"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22233-7_11"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21530-8_2"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011461409620"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189740.1189742"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2015.73"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.904776"},{"key":"e_1_2_2_32_1","volume-title":"Proceedings of the Workshop on End User Development in the Internet of Things Era - CHI\u201915 (EUDITE\u201915)","author":"Coutaz J.","unstructured":"J. Coutaz and J. L. Crowley . 2015. Learning about end-user development for smart homes by eating our own dog food . In Proceedings of the Workshop on End User Development in the Internet of Things Era - CHI\u201915 (EUDITE\u201915) . J. Coutaz and J. L. Crowley. 2015. Learning about end-user development for smart homes by eating our own dog food. In Proceedings of the Workshop on End User Development in the Internet of Things Era - CHI\u201915 (EUDITE\u201915)."},{"key":"e_1_2_2_33_1","doi-asserted-by":"crossref","unstructured":"F. Daniel and M. Matera. 2014. Mashups - Concepts Models and Architectures. Springer.  F. Daniel and M. Matera. 2014. Mashups - Concepts Models and Architectures. Springer.","DOI":"10.1007\/978-3-642-55049-2"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011271.2011273"},{"key":"e_1_2_2_35_1","first-page":"5","article-title":"Next in mashup development: User-created apps on the web","volume":"13","author":"Daniel F.","year":"2011","unstructured":"F. Daniel , M. Matera , and M. Weiss . 2011 . Next in mashup development: User-created apps on the web . IT Professional Magazine 13 , 5 , 22. F. Daniel, M. Matera, and M. Weiss. 2011. Next in mashup development: User-created apps on the web. IT Professional Magazine 13, 5, 22.","journal-title":"IT Professional Magazine"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.74"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1503_01"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19830-9_9"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28727-0_5"},{"key":"e_1_2_2_40_1","unstructured":"A. Dix J. E. Finlay G. D. Abowd and R. Beale. 2003. Human-Computer Interaction (3rd Edition). Prentice-Hall Inc.  A. Dix J. E. Finlay G. D. Abowd and R. Beale. 2003. Human-Computer Interaction (3rd Edition). Prentice-Hall Inc."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1619258.1619261"},{"key":"e_1_2_2_42_1","unstructured":"Crafty Apps EU. 2016. Tasker. Retrieved from http:\/\/tasker.dinglisch.net\/index.html.  Crafty Apps EU. 2016. Tasker. Retrieved from http:\/\/tasker.dinglisch.net\/index.html."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00427-8_1"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015884"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39862-4_7"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909132.2926083"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38706-7_12"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2836041.2836073"},{"key":"e_1_2_2_49_1","unstructured":"elastic.io GMBH. 2016. elastic.io. Retrieved from http:\/\/www.elastic.io\/.  elastic.io GMBH. 2016. elastic.io. Retrieved from http:\/\/www.elastic.io\/."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1996.0009"},{"key":"e_1_2_2_51_1","unstructured":"LAB at Rockwell Group. 2016. Spacebrew. Retrieved from http:\/\/docs.spacebrew.cc\/.  LAB at Rockwell Group. 2016. Spacebrew. Retrieved from http:\/\/docs.spacebrew.cc\/."},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19157-2_5"},{"key":"e_1_2_2_53_1","unstructured":"IBM. 2016. WebSphereJRules. Retrieved from https:\/\/www-01.ibm.com\/software\/integration\/business-rule-management\/jrules-family\/.  IBM. 2016. WebSphereJRules. Retrieved from https:\/\/www-01.ibm.com\/software\/integration\/business-rule-management\/jrules-family\/."},{"key":"e_1_2_2_54_1","unstructured":"IFTTT. 2016. IFTTT. Retrieved from https:\/\/ifttt.com\/.  IFTTT. 2016. IFTTT. Retrieved from https:\/\/ifttt.com\/."},{"key":"e_1_2_2_55_1","unstructured":"WigWag Inc. 2016. WigWag Smart Home. Retrieved from http:\/\/www.wigwag.com\/.  WigWag Inc. 2016. WigWag Smart Home. Retrieved from http:\/\/www.wigwag.com\/."},{"key":"e_1_2_2_56_1","unstructured":"Zapier Inc. 2016. Zapier. Retrieved from https:\/\/zapier.com\/.  Zapier Inc. 2016. Zapier. Retrieved from https:\/\/zapier.com\/."},{"key":"e_1_2_2_57_1","unstructured":"W. Jennifer and C. Stefano. 1996. Active Database Systems: Triggers and Rules for Advanced Database Processing. Morgan Kaufmann.  W. Jennifer and C. Stefano. 1996. Active Database Systems: Triggers and Rules for Advanced Database Processing. Morgan Kaufmann."},{"key":"e_1_2_2_58_1","unstructured":"JS_Foundation. 2016. Node-RED. Retrieved from http:\/\/nodered.org\/.  JS_Foundation. 2016. Node-RED. Retrieved from http:\/\/nodered.org\/."},{"key":"e_1_2_2_59_1","unstructured":"N. Juristo and A. M. Moreno. 2010. Basics of Software Engineering Experimentation. Springer.  N. Juristo and A. M. Moreno. 2010. Basics of Software Engineering Experimentation. Springer."},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18425-8_21"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02806-9_12"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X_1"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X"},{"key":"e_1_2_2_65_1","unstructured":"Itrios LLC. 2016. itDuzzit. Retrieved from http:\/\/cloud.itduzzit.com\/.  Itrios LLC. 2016. itDuzzit. Retrieved from http:\/\/cloud.itduzzit.com\/."},{"key":"e_1_2_2_66_1","unstructured":"SmarterApps Ltd. 2016. AutomateIt - Smart Automation. Retrieved from http:\/\/automateitapp.com\/.  SmarterApps Ltd. 2016. AutomateIt - Smart Automation. Retrieved from http:\/\/automateitapp.com\/."},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18425-8_14"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380121"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39200-9_43"},{"key":"e_1_2_2_70_1","volume-title":"Applied Statistics for Software Managers","author":"Maxwell K.","unstructured":"K. Maxwell . 2002. Applied Statistics for Software Managers . Prentice Hall . K. Maxwell. 2002. Applied Statistics for Software Managers. Prentice Hall."},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591689"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16985-4_35"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2010.17"},{"key":"e_1_2_2_74_1","unstructured":"OpenRules Inc. 2016. OpenRules Business Rules - Time to Excel. Retrieved from http:\/\/openrules.com\/ ruleengine.htm.  OpenRules Inc. 2016. OpenRules Business Rules - Time to Excel. Retrieved from http:\/\/openrules.com\/ ruleengine.htm."},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0410"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424816"},{"key":"e_1_2_2_77_1","unstructured":"Red Hat Inc. 2016. Drools. Retrieved from http:\/\/www.drools.org\/.  Red Hat Inc. 2016. Drools. Retrieved from http:\/\/www.drools.org\/."},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0272-0"},{"key":"e_1_2_2_79_1","volume-title":"Interaction Design: Beyond Human - Computer Interaction","author":"Rogers Y.","year":"2015","unstructured":"Y. Rogers , H. Sharp , and J. Preece . 2015 . Interaction Design: Beyond Human - Computer Interaction . Wiley . Y. Rogers, H. Sharp, and J. Preece. 2015. Interaction Design: Beyond Human - Computer Interaction. Wiley."},{"key":"e_1_2_2_80_1","unstructured":"M. B. Rosson and J. M. Carroll. 2003. Scenario-based design. In The Human-computer Interaction Handbook A. J. Julie and S. Andrew (Eds.). L. Erlbaum Associates Inc. 1032--1050.  M. B. Rosson and J. M. Carroll. 2003. Scenario-based design. In The Human-computer Interaction Handbook A. J. Julie and S. Andrew (Eds.). L. Erlbaum Associates Inc. 1032--1050."},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2702643"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522848.2522887"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557420"},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055056"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21530-8_6"},{"key":"e_1_2_2_86_1","unstructured":"wot.io. 2016. Bip.io. Retrieved from https:\/\/bip.io\/.  wot.io. 2016. Bip.io. Retrieved from https:\/\/bip.io\/."},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.08.007"},{"key":"e_1_2_2_88_1","volume-title":"Proceedings of the Museums and the Web Conference (MW\u201915)","author":"Zancanaro M.","unstructured":"M. Zancanaro , E. Not , D. Petrelli , M. Marshall , T. Van Dijk , M. Risseeuw , D. Van Dijk , A. Venturini , D. Cavada , and T. Kubitza . 2015. Recipes for tangible and embodied visit experiences . In Proceedings of the Museums and the Web Conference (MW\u201915) . Museums and the Web. M. Zancanaro, E. Not, D. Petrelli, M. Marshall, T. Van Dijk, M. Risseeuw, D. Van Dijk, A. Venturini, D. Cavada, and T. Kubitza. 2015. Recipes for tangible and embodied visit experiences. In Proceedings of the Museums and the Web Conference (MW\u201915). Museums and the Web."},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2008.4639055"},{"key":"e_1_2_2_90_1","unstructured":"Zipato. 2016. Zipato. Retrieved from https:\/\/www.zipato.com\/.  Zipato. 2016. Zipato. Retrieved from https:\/\/www.zipato.com\/."}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3057859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3057859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:02Z","timestamp":1750220642000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3057859"}},"subtitle":["Model, Composition Paradigms, and Domain-Specific Tools"],"short-title":[],"issued":{"date-parts":[[2017,4,27]]},"references-count":90,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4,30]]}},"alternative-id":["10.1145\/3057859"],"URL":"https:\/\/doi.org\/10.1145\/3057859","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"value":"1073-0516","type":"print"},{"value":"1557-7325","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,27]]},"assertion":[{"value":"2016-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}