{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T06:28:11Z","timestamp":1772692091363,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":108,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1814430"],"award-info":[{"award-number":["CNS-1814430"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338909","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"443-454","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Why aren\u2019t regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions"],"prefix":"10.1145","author":[{"given":"James C.","family":"Davis","sequence":"first","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Louis G.","family":"Michael IV","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Christy A.","family":"Coghlan","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Francisco","family":"Servant","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Dongyoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n.d.}. Hacker News. https:\/\/news.ycombinator.com\/.  {n.d.}. Hacker News. https:\/\/news.ycombinator.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"{n.d.}. Perl Regular Expressions - Perl. https:\/\/perldoc.perl.org\/5.22.0\/perlre. html.  {n.d.}. Perl Regular Expressions - Perl. https:\/\/perldoc.perl.org\/5.22.0\/perlre. html."},{"key":"e_1_3_2_1_3_1","unstructured":"{n.d.}. Reddit. https:\/\/www.reddit.com\/.  {n.d.}. Reddit. https:\/\/www.reddit.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"{n.d.}. Regular Expression Library. https:\/\/web.archive.org\/web\/ 20180920164647\/http:\/\/regexlib.com\/.  {n.d.}. Regular Expression Library. https:\/\/web.archive.org\/web\/ 20180920164647\/http:\/\/regexlib.com\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Stack Overflow - Regex tag. https:\/\/stackoverflow.com\/questions\/tagged\/ regex","year":"2009"},{"key":"e_1_3_2_1_6_1","first-page":"255","article-title":"Algorithms for finding patterns in strings","volume":"5","author":"Aho Alfred V","year":"1990","journal-title":"Elsevier, Chapter"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884629"},{"key":"e_1_3_2_1_8_1","volume-title":"MutRex: A Mutation-Based Generator of Fault Detecting Strings for Regular Expressions. In International Conference on Software Testing, Verification and Validation Workshops (ICSTW).","author":"Arcaini Paolo","year":"2017"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9650-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771796"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.03.067"},{"key":"e_1_3_2_1_12_1","unstructured":"Martin Berglund and Brink Van Der Merwe. 2017. Regular Expressions with Backreferences. In Prague Stringology. 30\u201341.  Martin Berglund and Brink Van Der Merwe. 2017. Regular Expressions with Backreferences. In Prague Stringology. 30\u201341."},{"key":"e_1_3_2_1_13_1","volume-title":"Snowball Sampling: Problems and Techniques of Chain Referral Sampling. Sociological Methods &amp","author":"Biernacki Patrick","year":"1981"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.09.016"},{"key":"e_1_3_2_1_15_1","unstructured":"James Britt and Neurogami Secret Laboratory. {n.d.}. Regexp - Ruby. https: \/\/ruby-doc.org\/core-2.3.1\/Regexp.html.  James Britt and Neurogami Secret Laboratory. {n.d.}. Regexp - Ruby. https: \/\/ruby-doc.org\/core-2.3.1\/Regexp.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.02.022"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931073"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Carl Chapman Peipei Wang and Kathryn T Stolee. 2017. Exploring Regular Expression Comprehension. In Automated Software Engineering (ASE).   Carl Chapman Peipei Wang and Kathryn T Stolee. 2017. Exploring Regular Expression Comprehension. In Automated Software Engineering (ASE).","DOI":"10.1109\/ASE.2017.8115653"},{"key":"e_1_3_2_1_19_1","volume-title":"A systematic review of fuzzing techniques. Computers &amp","author":"Chen Chen","year":"2018"},{"key":"e_1_3_2_1_20_1","unstructured":"Oracle Corp. {n.d.}. Pattern - Java. https:\/\/docs.oracle.com\/en\/java\/javase\/11\/ docs\/api\/java.base\/java\/util\/regex\/Pattern.html.  Oracle Corp. {n.d.}. Pattern - Java. https:\/\/docs.oracle.com\/en\/java\/javase\/11\/ docs\/api\/java.base\/java\/util\/regex\/Pattern.html."},{"key":"e_1_3_2_1_21_1","unstructured":"Russ Cox. 2007. Regular Expression Matching Can Be Simple And Fast (but is slow in Java Perl PHP Python Ruby ...).  Russ Cox. 2007. Regular Expression Matching Can Be Simple And Fast (but is slow in Java Perl PHP Python Ruby ...)."},{"key":"e_1_3_2_1_22_1","volume-title":"Denial of service through regular expressions. USENIX Security work in progress report","author":"Crosby Scott","year":"2003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236027"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Davis James C","year":"2018"},{"key":"e_1_3_2_1_25_1","unstructured":"Erik DeBill. {n.d.}. Module Counts. http:\/\/modulecounts-production.herokuapp. com\/.  Erik DeBill. {n.d.}. Module Counts. http:\/\/modulecounts-production.herokuapp. com\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Research Issues in the Renovation of Legacy Systems. Fundamental Approaches to Software Engineering 1577","author":"van Deursen Arie","year":"1999"},{"key":"e_1_3_2_1_27_1","unstructured":"The Rust Project Developers. {n.d.}. regex - Rust. https:\/\/docs.rs\/regex\/1.1.0\/ regex\/.  The Rust Project Developers. {n.d.}. regex - Rust. https:\/\/docs.rs\/regex\/1.1.0\/ regex\/."},{"key":"e_1_3_2_1_28_1","unstructured":"MDN Web Docs. {n.d.}. RegExp - JavaScript. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/RegExp.  MDN Web Docs. {n.d.}. RegExp - JavaScript. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/RegExp."},{"key":"e_1_3_2_1_29_1","unstructured":"MDN Web Docs. {n.d.}. Regular Expressions - JavaScript. https:\/\/developer. mozilla.org\/en-US\/docs\/Web\/JavaScript\/Guide\/Regular_Expressions.  MDN Web Docs. {n.d.}. Regular Expressions - JavaScript. https:\/\/developer. mozilla.org\/en-US\/docs\/Web\/JavaScript\/Guide\/Regular_Expressions."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2006.205215"},{"key":"e_1_3_2_1_32_1","volume-title":"1037\u20131045","author":"March","year":"2006"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897101"},{"key":"e_1_3_2_1_34_1","volume-title":"IEEE Symposium on Security and Privacy (IEEE S&amp;P). 121\u2013136","author":"Fischer Felix","year":"2017"},{"key":"e_1_3_2_1_35_1","unstructured":"Python Software Foundation. {n.d.}. re \u2013 Regular expression operations - Python. https:\/\/docs.python.org\/3.6\/library\/re.html.  Python Software Foundation. {n.d.}. re \u2013 Regular expression operations - Python. https:\/\/docs.python.org\/3.6\/library\/re.html."},{"key":"e_1_3_2_1_36_1","volume-title":"Refactoring: improving the design of existing code","author":"Fowler Martin"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.85"},{"key":"e_1_3_2_1_38_1","volume-title":"Mastering regular expressions. \" O\u2019Reilly Media","author":"Friedl Jeffrey EF"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9648-z"},{"key":"e_1_3_2_1_40_1","unstructured":"GitHub. 2018. The State of the Octoverse. https:\/\/octoverse.github.com\/.  GitHub. 2018. The State of the Octoverse. https:\/\/octoverse.github.com\/."},{"key":"e_1_3_2_1_41_1","unstructured":"Google. {n.d.}. regexp - Go. https:\/\/golang.org\/pkg\/regexp\/.  Google. {n.d.}. regexp - Go. https:\/\/golang.org\/pkg\/regexp\/."},{"key":"e_1_3_2_1_42_1","unstructured":"The PHP Group. {n.d.}. Regexp - PHP. http:\/\/php.net\/manual\/en\/regexp. introduction.php.  The PHP Group. {n.d.}. Regexp - PHP. http:\/\/php.net\/manual\/en\/regexp. introduction.php."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.10.002"},{"key":"e_1_3_2_1_44_1","unstructured":"Hazel Philip. 2018. PCRE - Perl Compatible Regular Expressions. https:\/\/web. archive.org\/web\/20180919101106\/https:\/\/www.pcre.org\/.  Hazel Philip. 2018. PCRE - Perl Compatible Regular Expressions. https:\/\/web. archive.org\/web\/20180919101106\/https:\/\/www.pcre.org\/."},{"key":"e_1_3_2_1_45_1","volume-title":"The open group base specifications issue 7","author":"IEEE and The Open Group","year":"2018"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/118014.117980"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.60"},{"key":"e_1_3_2_1_49_1","volume-title":"Pfleeger","author":"Kitchenham Barbara A.","year":"2008"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.7"},{"key":"e_1_3_2_1_51_1","unstructured":"A.M. Kuchling. {n.d.}. Regular Expression HOWTO - Python. https:\/\/docs. python.org\/3.6\/howto\/regex.html.  A.M. Kuchling. {n.d.}. Regular Expression HOWTO - Python. https:\/\/docs. python.org\/3.6\/howto\/regex.html."},{"key":"e_1_3_2_1_52_1","unstructured":"Mark Kvale. {n.d.}. Perl Regular Expressions Tutorial - Perl. https:\/\/perldoc.perl. org\/5.22.0\/perlretut.html.  Mark Kvale. {n.d.}. Perl Regular Expressions Tutorial - Perl. https:\/\/perldoc.perl. org\/5.22.0\/perlretut.html."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Eric Larson. 2018. Automatic Checking of Regular Expressions. In Source Code Analysis and Manipulation (SCAM).  Eric Larson. 2018. Automatic Checking of Regular Expressions. In Source Code Analysis and Manipulation (SCAM).","DOI":"10.1109\/SCAM.2018.00034"},{"key":"e_1_3_2_1_54_1","volume-title":"Generating Evil Test Strings for Regular Expressions. In International Conference on Software Testing, Verification and Validation (ICST).","author":"Larson Eric","year":"2016"},{"key":"e_1_3_2_1_55_1","volume-title":"Conference of the Centre for Advanced Studies on Collaborative Research.","author":"Lau Terry","year":"2001"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133908"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.8"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the ASERC Workshop on Software Architecture","author":"Malton Andrew J","year":"2001"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/648329.755270"},{"key":"e_1_3_2_1_60_1","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman William M","year":"1998","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180201"},{"key":"e_1_3_2_1_62_1","unstructured":"ESEC\/FSE \u201919 August 26\u201330 2019 Tallinn Estonia James C. Davis Louis G. Michael IV Christy A. Coghlan Francisco Servant and Dongyoon Lee  ESEC\/FSE \u201919 August 26\u201330 2019 Tallinn Estonia James C. Davis Louis G. Michael IV Christy A. Coghlan Francisco Servant and Dongyoon Lee"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2007.10"},{"key":"e_1_3_2_1_64_1","volume-title":"dk. brics. automaton\u2013finite-state automata and regular expressions for Java","author":"M\u00f8ller Anders","year":"2010"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/872754.873596"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405249"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080795"},{"key":"e_1_3_2_1_68_1","unstructured":"PerlMonks. {n.d.}. Perl regexp matching is slow?? https:\/\/perlmonks.org\/?node_ id=597262.  PerlMonks. {n.d.}. Perl regexp matching is slow?? https:\/\/perlmonks.org\/?node_ id=597262."},{"key":"e_1_3_2_1_69_1","unstructured":"PerlMonks. {n.d.}. Snapshot of Perl 5 regex.c. https:\/\/web.archive.org\/web\/ 20190206210240\/https:\/\/github.com\/Perl\/perl5\/blob\/blead\/regexec.c.  PerlMonks. {n.d.}. Snapshot of Perl 5 regex.c. https:\/\/web.archive.org\/web\/ 20190206210240\/https:\/\/github.com\/Perl\/perl5\/blob\/blead\/regexec.c."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.17"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486988"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597077"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9195-3"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.01.008"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693095"},{"key":"e_1_3_2_1_77_1","volume-title":"VAC - ReDoS: Regular Expression Denial Of Service. Open Web Application Security Project (OWASP)","author":"Roichman Alex","year":"2009"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_79_1","volume-title":"IEEE International Conference on Program Comprehension (ICPC). IEEE.","author":"Mojica Ruiz Israel J","year":"2012"},{"key":"e_1_3_2_1_80_1","volume-title":"Rod Seung-Hwan Lim, and Judith Fullerton","author":"Sadler Georgia Robins","year":"2010"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9572-7"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.12"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380111005"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1295014.1295019"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238159"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9286-4"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/580914.858229"},{"key":"e_1_3_2_1_89_1","volume-title":"Introduction to the Theory of Computation","author":"Sipser Michael"},{"key":"e_1_3_2_1_90_1","unstructured":"Henry Spencer. 1994. A regular-expression matcher. In Software solutions in C. 35\u201371.   Henry Spencer. 1994. A regular-expression matcher. In Software solutions in C. 35\u201371."},{"key":"e_1_3_2_1_91_1","volume-title":"Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers. In USENIX Security Symposium (USENIX Security).","author":"Staicu Cristian-Alexandru","year":"2018"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972782"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.895180"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.24"},{"key":"e_1_3_2_1_96_1","unstructured":"Iain Truskett. {n.d.}. Perl Regular Expressions Reference - Perl. https:\/\/perldoc. perl.org\/5.22.0\/perlreref.html.  Iain Truskett. {n.d.}. Perl Regular Expressions Reference - Perl. https:\/\/perldoc. perl.org\/5.22.0\/perlreref.html."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129416.3129440"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.35"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.15"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"crossref","unstructured":"Peipei Wang Gina R Bai and Kathryn T Stolee. 2019. Exploring Regular Expression Evolution. In Software Analysis Evolution and Reengineering (SANER).  Peipei Wang Gina R Bai and Kathryn T Stolee. 2019. Exploring Regular Expression Evolution. In Software Analysis Evolution and Reengineering (SANER).","DOI":"10.1109\/SANER.2019.8667972"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236072"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.7629"},{"key":"e_1_3_2_1_103_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","volume-title":"Analyzing matching time behavior of backtracking regular expression matchers by using ambiguity of NFA","author":"Weideman Nicolaas"},{"key":"e_1_3_2_1_104_1","volume-title":"The Free Encyclopedia. https:\/\/web.archive.org\/web\/20180920152821\/https:\/\/en.wikipedia. org\/w\/index.php?title=Regular_expression.","author":"Wikipedia"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693113"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54580-5_1"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901767"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.13"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180260"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338909","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:20Z","timestamp":1750206380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":108,"alternative-id":["10.1145\/3338906.3338909","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338909","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}