{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:28Z","timestamp":1750220908337,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T00:00:00Z","timestamp":1570406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,7]]},"DOI":"10.1145\/3354166.3354179","type":"proceedings-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T12:58:36Z","timestamp":1569329916000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Smart Contracts as Authorized Production Rules"],"prefix":"10.1145","author":[{"given":"Ben","family":"Lippmeier","sequence":"first","affiliation":[{"name":"UNSW (Australia)"}]},{"given":"Amos","family":"Robinson","sequence":"additional","affiliation":[{"name":"UNSW (Australia)"}]},{"given":"Andrae","family":"Muys","sequence":"additional","affiliation":[{"name":"Digital Asset"}]}],"member":"320","published-online":{"date-parts":[[2019,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CSL language guide documentation release v0.30.0. https:\/\/deondigital.com\/docs\/v0.30.0\/cslguide.pdf.  CSL language guide documentation release v0.30.0. https:\/\/deondigital.com\/docs\/v0.30.0\/cslguide.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"DAML SDK documentation. https:\/\/docs.daml.com\/index.html. Accessed: 2019-04-27.  DAML SDK documentation. https:\/\/docs.daml.com\/index.html. Accessed: 2019-04-27."},{"key":"e_1_3_2_1_3_1","unstructured":"Financial Core Language (FCL). https:\/\/www.adjoint.io\/docs\/workflows.html. Accessed: 2019-04-27.  Financial Core Language (FCL). https:\/\/www.adjoint.io\/docs\/workflows.html. Accessed: 2019-04-27."},{"key":"e_1_3_2_1_4_1","unstructured":"The Docker website. https:\/\/www.docker.com\/. Accessed: 2019-05-03.  The Docker website. https:\/\/www.docker.com\/. Accessed: 2019-05-03."},{"key":"e_1_3_2_1_5_1","first-page":"172","author":"Abadi Mart\u00edn","year":"2007","unstructured":"Mart\u00edn Abadi . Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science , 172 , 2007 . Mart\u00edn Abadi. Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science, 172, 2007.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292555"},{"key":"e_1_3_2_1_7_1","volume-title":"ACM","author":"Agha Gul","year":"1993","unstructured":"Gul Agha and Christian J Callsen . ActorSpace : an open distributed programming paradigm. In Principles and Practice of Parallel Programming (PPoPP) . ACM , 1993 . Gul Agha and Christian J Callsen. ActorSpace: an open distributed programming paradigm. In Principles and Practice of Parallel Programming (PPoPP). ACM, 1993."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0084816"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_10_1","volume-title":"The Lana-Match algorithm: a parallel version of the Rete-Match algorithm. Parallel Computing, 24(5-6)","author":"Aref Mostafa M","year":"1998","unstructured":"Mostafa M Aref and Mohammed A Tayyib . The Lana-Match algorithm: a parallel version of the Rete-Match algorithm. Parallel Computing, 24(5-6) , 1998 . Mostafa M Aref and Mohammed A Tayyib. The Lana-Match algorithm: a parallel version of the Rete-Match algorithm. Parallel Computing, 24(5-6), 1998."},{"key":"e_1_3_2_1_11_1","volume-title":"A formal model of Bitcoin transactions. IACR Cryptology ePrint Archive","author":"Atzei Nicola","year":"2017","unstructured":"Nicola Atzei , Massimo Bartoletti , Stefano Lande , and Roberto Zunino . A formal model of Bitcoin transactions. IACR Cryptology ePrint Archive , 2017 . Nicola Atzei, Massimo Bartoletti, Stefano Lande, and Roberto Zunino. A formal model of Bitcoin transactions. IACR Cryptology ePrint Archive, 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"The chemical abstract machine. Theoretical Computer Science, 96(1)","author":"Berry G\u00e9rard","year":"1992","unstructured":"G\u00e9rard Berry and G\u00e9rard Boudol . The chemical abstract machine. Theoretical Computer Science, 96(1) , 1992 . G\u00e9rard Berry and G\u00e9rard Boudol. The chemical abstract machine. Theoretical Computer Science, 96(1), 1992."},{"key":"e_1_3_2_1_13_1","volume-title":"An XML query language","author":"Boag Scott","year":"2002","unstructured":"Scott Boag , Don Chamberlin , Mary F Fern\u00e1ndez , Daniela Florescu , Jonathan Robie , J\u00e9r\u00f4me Sim\u00e9on , and Mugur Stefanescu . X Query 1.0 : An XML query language . 2002 . Scott Boag, Don Chamberlin, Mary F Fern\u00e1ndez, Daniela Florescu, Jonathan Robie, J\u00e9r\u00f4me Sim\u00e9on, and Mugur Stefanescu. XQuery 1.0: An XML query language. 2002."},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Bowe Sean","year":"2018","unstructured":"Sean Bowe , Ariel Gabizon , and Matthew D Green . A multi-party protocol for constructing the public parameters of the pinocchio zk-snark . In International Conference on Financial Cryptography and Data Security , 2018 . Sean Bowe, Ariel Gabizon, and Matthew D Green. A multi-party protocol for constructing the public parameters of the pinocchio zk-snark. In International Conference on Financial Cryptography and Data Security, 2018."},{"key":"e_1_3_2_1_15_1","volume-title":"Annual Network and Distributed System Security Symposium","author":"Bowers Kevin D","year":"2007","unstructured":"Kevin D Bowers , Lujo Bauer , Deepak Garg , Frank Pfenning , and Michael K Reiter . Consumable credentials in logic-based access-control systems . In Annual Network and Distributed System Security Symposium , 2007 . Kevin D Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, and Michael K Reiter. Consumable credentials in logic-based access-control systems. In Annual Network and Distributed System Security Symposium, 2007."},{"key":"e_1_3_2_1_16_1","volume-title":"SecSpaces: a data-driven coordination model for environments open to untrusted agents. Electronic Notes in Theoretical Computer Science, 68(3)","author":"Busi Nadia","year":"2003","unstructured":"Nadia Busi , Roberto Gorrieri , Roberto Lucchi , and Gianluigi Zavattaro . SecSpaces: a data-driven coordination model for environments open to untrusted agents. Electronic Notes in Theoretical Computer Science, 68(3) , 2003 . Nadia Busi, Roberto Gorrieri, Roberto Lucchi, and Gianluigi Zavattaro. SecSpaces: a data-driven coordination model for environments open to untrusted agents. Electronic Notes in Theoretical Computer Science, 68(3), 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Coordinating rule-based software processes with ESP. ACM Transactions on Software Engineering and Methodology (TOSEM), 2(3)","author":"Ciancarini Paolo","year":"1993","unstructured":"Paolo Ciancarini . Coordinating rule-based software processes with ESP. ACM Transactions on Software Engineering and Methodology (TOSEM), 2(3) , 1993 . Paolo Ciancarini. Coordinating rule-based software processes with ESP. ACM Transactions on Software Engineering and Methodology (TOSEM), 2(3), 1993."},{"key":"e_1_3_2_1_18_1","volume-title":"Distributed programming with logic tuple spaces. New Generation Computing, 12(3)","author":"Ciancarini Paolo","year":"1994","unstructured":"Paolo Ciancarini . Distributed programming with logic tuple spaces. New Generation Computing, 12(3) , 1994 . Paolo Ciancarini. Distributed programming with logic tuple spaces. New Generation Computing, 12(3), 1994."},{"key":"e_1_3_2_1_19_1","volume-title":"Resource-aware session types for digital contracts. arXiv preprint arXiv:1902.06056","author":"Das Ankush","year":"2019","unstructured":"Ankush Das , Stephanie Balzer , Jan Hoffmann , and Frank Pfenning . Resource-aware session types for digital contracts. arXiv preprint arXiv:1902.06056 , 2019 . Ankush Das, Stephanie Balzer, Jan Hoffmann, and Frank Pfenning. Resource-aware session types for digital contracts. arXiv preprint arXiv:1902.06056, 2019."},{"key":"e_1_3_2_1_20_1","volume-title":"Production matching for large learning systems. Technical report","author":"Doorenbos Robert B","year":"1995","unstructured":"Robert B Doorenbos . Production matching for large learning systems. Technical report , Carnegie-Mellon University , 1995 . Robert B Doorenbos. Production matching for large learning systems. Technical report, Carnegie-Mellon University, 1995."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_28"},{"key":"e_1_3_2_1_22_1","volume-title":"ACM SIGPLAN Notices","author":"Findler Robert Bruce","year":"2002","unstructured":"Robert Bruce Findler and Matthias Felleisen . Contracts for higher-order functions . In ACM SIGPLAN Notices , volume 37 . ACM , 2002 . Robert Bruce Findler and Matthias Felleisen. Contracts for higher-order functions. In ACM SIGPLAN Notices, volume 37. ACM, 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA106558","volume-title":"OPS5 user's manual. Technical report","author":"Forgy Charles L","year":"1981","unstructured":"Charles L Forgy . OPS5 user's manual. Technical report , Carnegie-Mellon University , 1981 . Charles L Forgy. OPS5 user's manual. Technical report, Carnegie-Mellon University, 1981."},{"key":"e_1_3_2_1_24_1","volume-title":"Readings in Artificial Intelligence and Databases","author":"Forgy Charles L","year":"1989","unstructured":"Charles L Forgy . Rete: A fast algorithm for the many pattern\/many object pattern match problem . In Readings in Artificial Intelligence and Databases . Elsevier , 1989 . Charles L Forgy. Rete: A fast algorithm for the many pattern\/many object pattern match problem. In Readings in Artificial Intelligence and Databases. Elsevier, 1989."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237805"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0743-1066(98)10005-5"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.18"},{"issue":"1","key":"e_1_3_2_1_28_1","volume":"7","author":"Gelernter David","year":"1985","unstructured":"David Gelernter . Generative communication in Linda. Transactions on Programming Languages and Systems , 7 ( 1 ), 1985 . David Gelernter. Generative communication in Linda. Transactions on Programming Languages and Systems, 7(1), 1985.","journal-title":"Linda. Transactions on Programming Languages and Systems"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_30_1","volume-title":"EOS - An Introduction","author":"Grigg Ian","year":"2017","unstructured":"Ian Grigg . EOS - An Introduction , 2017 . Ian Grigg. EOS - An Introduction, 2017."},{"key":"e_1_3_2_1_31_1","volume-title":"Towards safer smart contracts: A survey of languages and verification methods. CoRR, abs\/1809.09805","author":"Harz Dominik","year":"2018","unstructured":"Dominik Harz and William J. Knottenbelt . Towards safer smart contracts: A survey of languages and verification methods. CoRR, abs\/1809.09805 , 2018 . Dominik Harz and William J. Knottenbelt. Towards safer smart contracts: A survey of languages and verification methods. CoRR, abs\/1809.09805, 2018."},{"key":"e_1_3_2_1_32_1","volume-title":"Corda Technical White Paper","author":"Hearn Mike","year":"2016","unstructured":"Mike Hearn . Corda : A distributed ledger . Corda Technical White Paper , 2016 . Mike Hearn. Corda: A distributed ledger. Corda Technical White Paper, 2016."},{"key":"e_1_3_2_1_33_1","volume-title":"ZCash protocol specification. Tech. rep. 2016--1.10","author":"Hopwood Daira","year":"2016","unstructured":"Daira Hopwood , Sean Bowe , Taylor Hornby , and Nathan Wilcox . ZCash protocol specification. Tech. rep. 2016--1.10 . Zerocoin Electric Coin Company , 2016 . Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. ZCash protocol specification. Tech. rep. 2016--1.10. Zerocoin Electric Coin Company, 2016."},{"key":"e_1_3_2_1_34_1","unstructured":"IOHK. Formal specification of the Plutus core language (version 2.0). https:\/\/hydra.iohk.io\/build\/798158\/download\/1\/plutus-core-specification.pdf. Accessed: 2019-04-27.  IOHK. Formal specification of the Plutus core language (version 2.0). https:\/\/hydra.iohk.io\/build\/798158\/download\/1\/plutus-core-specification.pdf. Accessed: 2019-04-27."},{"key":"e_1_3_2_1_35_1","volume-title":"Coloured Petri nets and the invariant-method. Theoretical computer science, 14(3)","author":"Jensen Kurt","year":"1981","unstructured":"Kurt Jensen . Coloured Petri nets and the invariant-method. Theoretical computer science, 14(3) , 1981 . Kurt Jensen. Coloured Petri nets and the invariant-method. Theoretical computer science, 14(3), 1981."},{"key":"e_1_3_2_1_36_1","volume-title":"ACM SIGPLAN Notices","volume":"43","author":"Jia Limin","year":"2008","unstructured":"Limin Jia , Jeffrey A Vaughan , Karl Mazurak , Jianzhou Zhao , Luke Zarko , Joseph Schorr , and Steve Zdancewic . Aura : A programming language for authorization and audit . In ACM SIGPLAN Notices , volume 43 , 2008 . Limin Jia, Jeffrey A Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit. In ACM SIGPLAN Notices, volume 43, 2008."},{"key":"e_1_3_2_1_37_1","volume-title":"The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3)","author":"Lamport Leslie","year":"1982","unstructured":"Leslie Lamport , Robert Shostak , and Marshall Pease . The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3) , 1982 . Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), 1982."},{"issue":"1","key":"e_1_3_2_1_38_1","volume":"4","author":"Lohmann Niels","year":"2009","unstructured":"Niels Lohmann , Eric Verbeek , Chun Ouyang , Christian Stahl , and Wil MP van der Aalst . Comparing and evaluating Petri net semantics for BPEL. International Journal of Business Process Integration and Management , 4 ( 1 ), 2009 . Niels Lohmann, Eric Verbeek, Chun Ouyang, Christian Stahl, and Wil MP van der Aalst. Comparing and evaluating Petri net semantics for BPEL. International Journal of Business Process Integration and Management, 4(1), 2009.","journal-title":"BPEL. International Journal of Business Process Integration and Management"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/335603.335747"},{"key":"e_1_3_2_1_40_1","volume-title":"European Conference on Object-Oriented Programming","author":"Minsky Naftaly H","year":"1994","unstructured":"Naftaly H Minsky and Jerrold Leichter . Law-governed Linda as a coordination model . In European Conference on Object-Oriented Programming , 1994 . Naftaly H Minsky and Jerrold Leichter. Law-governed Linda as a coordination model. In European Conference on Object-Oriented Programming, 1994."},{"key":"e_1_3_2_1_41_1","volume-title":"Safe tuplespace-based coordination in multiagent systems. Applied Artificial Intelligence, 15(1)","author":"Minsky Naftaly H","year":"2001","unstructured":"Naftaly H Minsky , Yaron M Minsky , and Victoria Ungureanu . Safe tuplespace-based coordination in multiagent systems. Applied Artificial Intelligence, 15(1) , 2001 . Naftaly H Minsky, Yaron M Minsky, and Victoria Ungureanu. Safe tuplespace-based coordination in multiagent systems. Applied Artificial Intelligence, 15(1), 2001."},{"key":"e_1_3_2_1_42_1","volume-title":"Nested transactions: An approach to reliable distributed computing. Technical report","author":"Blakeslee Moss John Eliot","year":"1981","unstructured":"John Eliot Blakeslee Moss . Nested transactions: An approach to reliable distributed computing. Technical report , Massachusetts Institute of Technology , 1981 . John Eliot Blakeslee Moss. Nested transactions: An approach to reliable distributed computing. Technical report, Massachusetts Institute of Technology, 1981."},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Annual Technical Conference","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout . In search of an understandable consensus algorithm . In USENIX Annual Technical Conference , 2014 . Diego Ongaro and John Ousterhout. In search of an understandable consensus algorithm. In USENIX Annual Technical Conference, 2014."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/11417019_17"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8656-6","volume-title":"Active database systems. ACM Computing Surveys (CSUR), 31(1)","author":"Paton Norman W","year":"1999","unstructured":"Norman W Paton and Oscar D\u00edaz . Active database systems. ACM Computing Surveys (CSUR), 31(1) , 1999 . Norman W Paton and Oscar D\u00edaz. Active database systems. ACM Computing Surveys (CSUR), 31(1), 1999."},{"key":"e_1_3_2_1_46_1","volume-title":"ACM SIGPLAN Notices","author":"Jones Simon Peyton","year":"2000","unstructured":"Simon Peyton Jones , Jean-Marc Eber , and Julian Seward . Composing contracts: an adventure in financial engineering (functional pearl) . In ACM SIGPLAN Notices , volume 35 . ACM , 2000 . Simon Peyton Jones, Jean-Marc Eber, and Julian Seward. Composing contracts: an adventure in financial engineering (functional pearl). In ACM SIGPLAN Notices, volume 35. ACM, 2000."},{"key":"e_1_3_2_1_47_1","volume-title":"The Pact smart contract language","author":"Popejoy Stuart","year":"2016","unstructured":"Stuart Popejoy . The Pact smart contract language , 2016 . Stuart Popejoy. The Pact smart contract language, 2016."},{"key":"e_1_3_2_1_48_1","volume-title":"CLIPS basic programming guide, version 6.40 beta","author":"Riley Gary","year":"2017","unstructured":"Gary Riley . CLIPS basic programming guide, version 6.40 beta , 2017 . Gary Riley. CLIPS basic programming guide, version 6.40 beta, 2017."},{"key":"e_1_3_2_1_49_1","volume-title":"Scilla: a smart contract intermediate-level language. CoRR, abs\/1801.00687","author":"Sergey Ilya","year":"2018","unstructured":"Ilya Sergey , Amrit Kumar , and Aquinas Hobor . Scilla: a smart contract intermediate-level language. CoRR, abs\/1801.00687 , 2018 . Ilya Sergey, Amrit Kumar, and Aquinas Hobor. Scilla: a smart contract intermediate-level language. CoRR, abs\/1801.00687, 2018."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68265-3_20"},{"key":"e_1_3_2_1_51_1","volume-title":"Coordination with multicapabilities. Science of Computer Programming, 64(2)","author":"Udzir Nur Izura","year":"2007","unstructured":"Nur Izura Udzir , Alan M Wood , and Jeremy L Jacob . Coordination with multicapabilities. Science of Computer Programming, 64(2) , 2007 . Nur Izura Udzir, Alan M Wood, and Jeremy L Jacob. Coordination with multicapabilities. Science of Computer Programming, 64(2), 2007."},{"key":"e_1_3_2_1_52_1","unstructured":"Fabian Vogelsteller and Vitalik Buterin. ERC-20: A standard interface for tokens. https:\/\/github.com\/ethereum\/EIPs\/blob\/e7dac5b8287106143d361b1de3704ce0bba31983\/EIPS\/eip-20.md.  Fabian Vogelsteller and Vitalik Buterin. ERC-20: A standard interface for tokens. https:\/\/github.com\/ethereum\/EIPs\/blob\/e7dac5b8287106143d361b1de3704ce0bba31983\/EIPS\/eip-20.md."},{"key":"e_1_3_2_1_53_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . Ethereum: A secure decentralised generalised transaction ledger , 2014 . Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger, 2014."},{"key":"e_1_3_2_1_54_1","volume-title":"An abstract model of UTxO-based cryptocurrencies with scripts. IACR Cryptology ePrint Archive","author":"Zahnentferner Joachim","year":"2018","unstructured":"Joachim Zahnentferner . An abstract model of UTxO-based cryptocurrencies with scripts. IACR Cryptology ePrint Archive , 2018 . Joachim Zahnentferner. An abstract model of UTxO-based cryptocurrencies with scripts. IACR Cryptology ePrint Archive, 2018."},{"key":"e_1_3_2_1_55_1","volume-title":"Chimeric ledgers: translating and unifying UTxO-based and account-based cryptocurrencies. IACR Cryptology ePrint Archive","author":"Zahnentferner Joachim","year":"2018","unstructured":"Joachim Zahnentferner . Chimeric ledgers: translating and unifying UTxO-based and account-based cryptocurrencies. IACR Cryptology ePrint Archive , 2018 . Joachim Zahnentferner. Chimeric ledgers: translating and unifying UTxO-based and account-based cryptocurrencies. IACR Cryptology ePrint Archive, 2018."}],"event":{"name":"PPDP '19: Principles and Practice of Programming Languages 2019","sponsor":["Sony Sony Corporation"],"location":"Porto Portugal","acronym":"PPDP '19"},"container-title":["Proceedings of the 21st International Symposium on Principles and Practice of Declarative Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3354166.3354179","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3354166.3354179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:56Z","timestamp":1750203896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3354166.3354179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,7]]},"references-count":55,"alternative-id":["10.1145\/3354166.3354179","10.1145\/3354166"],"URL":"https:\/\/doi.org\/10.1145\/3354166.3354179","relation":{},"subject":[],"published":{"date-parts":[[2019,10,7]]},"assertion":[{"value":"2019-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}