{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:18:46Z","timestamp":1772039926586,"version":"3.50.1"},"reference-count":152,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2020,6,21]],"date-time":"2020-06-21T00:00:00Z","timestamp":1592697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2020,9,30]]},"abstract":"<jats:p>Detecting abnormal trajectories is an important task in research and industrial applications, which has attracted considerable attention in recent decades. This work studies the existing trajectory outlier detection algorithms in different industrial domains and applications, including maritime, smart urban transportation, video surveillance, and climate change domains. First, we review several algorithms for trajectory outlier detection. Second, different taxonomies are proposed regarding application-, output-, and algorithm-based levels. Third, evaluation of 10 trajectory outlier detection algorithms is performed on small, large, and big trajectory databases. Finally, future challenges and open issues with regard to trajectory outliers are derived and discussed. This survey offers a general overview of existing trajectory outlier detection algorithms in industrial informatics applications. As a result, mature solutions may be further developed by data mining and machine learning communities.<\/jats:p>","DOI":"10.1145\/3399631","type":"journal-article","created":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T02:39:09Z","timestamp":1592793549000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Trajectory Outlier Detection"],"prefix":"10.1145","volume":"11","author":[{"given":"Asma","family":"Belhadi","sequence":"first","affiliation":[{"name":"Kristiania University College, Kirkegata, Oslo, Norway"}]},{"given":"Youcef","family":"Djenouri","sequence":"additional","affiliation":[{"name":"SINTEF Digital, Forskningsveien, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Western Norway University of Applied Sciences, Inndalsveien, Bergen, Norway"}]},{"given":"Alberto","family":"Cano","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University, Richmond, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.028"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.05.023"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/170036.170072"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.234"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909114"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-013-0334-x"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321552"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161602"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939846"},{"key":"e_1_2_1_11_1","first-page":"256","article-title":"Outliers in statistical","volume":"37","author":"Barnett Vic","year":"1995","journal-title":"Biometrical Journal"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3225643.3225840"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990799"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2019.00067"},{"key":"e_1_2_1_15_1","first-page":"2020","article-title":"A general-purpose distributed pattern mining system","volume":"18","author":"Belhadi Asma","year":"2020","journal-title":"Applied Intelligence. Open Access"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964682"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1067-8"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","volume-title":"Trajectory outlier detection for traffic events: A survey","author":"Bhowmick Kiran","DOI":"10.1007\/978-981-10-7245-1_5"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937505"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9040757"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2302521"},{"key":"e_1_2_1_22_1","volume-title":"Robust principal component analysis?Journal of the ACM 58, 3","author":"Cand\u00e8s Emmanuel J.","year":"2011"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.08.022"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1232"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv:1901.03407.  Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv:1901.03407.","DOI":"10.1145\/3394486.3406704"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2332116"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2238531"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00128-0"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/GEOINFORMATICS.2017.8090919"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the International Conference on Image Processing","volume":"1","author":"Chen Yunqiang"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2846411"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/BRACIS.2015.36"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2860568"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.376493"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311950"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891933"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893124"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.043"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57529-2_50"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.020"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3227609.3227692"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.037"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.13"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the International Conference on Knowledge Discovery and Data Mining","volume":"96","author":"Ester Martin","year":"1996"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2553681"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the IEEE International Conference on Data Mining Workshops. 385--394","author":"Auroop"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71273-4_45"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871716"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281230"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr026"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.006"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_2_1_57_1","first-page":"1","article-title":"The rise of crowdsourcing","volume":"14","author":"Howe Jeff","year":"2006","journal-title":"Wired Magazine"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.176"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983886"},{"key":"e_1_2_1_60_1","volume-title":"AIP Conference Proceedings","volume":"2073","author":"Huang Yingfu","year":"2019"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.2012070"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2409559"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2503323"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0487-4"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"e_1_2_1_66_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.2498\/cit.2006.04.04"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.100"},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the International Conference on Information Fusion. 1--8.","author":"Laxhammar Rikard","year":"2011"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.172"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497422"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0845-4"},{"key":"e_1_2_1_73_1","volume-title":"Multi-view low-rank analysis with applications to outlier detection. ACM Transactions on Knowledge Discovery from Data 12, 3","author":"Li Sheng","year":"2018"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920934"},{"key":"e_1_2_1_75_1","volume-title":"Fuzzy discriminant analysis with outlier detection by genetic algorithm. Computers 8 Operations Research 31, 6","author":"Lin Chang-Chun","year":"2004"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.01.003"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2255616"},{"key":"e_1_2_1_79_1","unstructured":"Hongfu Liu Jun Li Yue Wu and Yun Fu. 2019. Clustering with outlier removal. arXiv:1801.01899.  Hongfu Liu Jun Li Yue Wu and Yun Fu. 2019. Clustering with outlier removal. arXiv:1801.01899."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2012.654792"},{"key":"e_1_2_1_81_1","volume-title":"Ni","author":"Liu Siyuan","year":"2014"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2905606"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2017.8393023"},{"key":"e_1_2_1_84_1","first-page":"14","volume-title":"Berkeley Symposium on Mathematical Statistics and Probability 1","author":"MacQueen James","year":"1967"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899940"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975321.8"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2744619"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2011.62"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.08.002"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9619-1"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1787234.1787249"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1238"},{"key":"e_1_2_1_94_1","volume-title":"Proceedings of the Conference on Genetic and Evolutionary Computation. 83--84","author":"Mohemmed Ammar W."},{"key":"e_1_2_1_95_1","first-page":"61","article-title":"Comparison of Euclidean distance function and Manhattan distance function using k-mediods","volume":"13","author":"Mohibullah Md","year":"2015","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.927109"},{"key":"e_1_2_1_97_1","volume-title":"Proceedings of the 20th International Conference on Very Large Data Bases (VLDB\u201994)","author":"Raymond"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23814-2_11"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2018.12.018"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2005599"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.29"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.515"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6520-0_10"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.3390\/info9100258"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335437"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9319-1"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2875083"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2013.6642525"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-018-0732-1"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0300-z"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502567"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2330576"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2786782"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894435"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2002.807277"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0417-8"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2349359"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-003-0310-2"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-019-00568-7"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-012-0752-6"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293318"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi7010025"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.138"},{"key":"e_1_2_1_125_1","volume-title":"Proceedings of the Conference on Genetic and Evolutionary Computation. 1345--1352","author":"Whitacre James M."},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2328291"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2002.1184035"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132933"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70731"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908191"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.5555\/1473147.1473152"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93701-4_50"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.504"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3013527"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1104-z"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623735"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2013.04.007"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030127"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891261"},{"key":"e_1_2_1_140_1","volume-title":"Proceedings of the IS 8 TSPIE Electronic Imaging Symposium","volume":"8664","author":"Zhang Tong","year":"2016"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2018.00021"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/2743025"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629592"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526816"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2014.11.019"},{"key":"e_1_2_1_146_1","volume-title":"Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 665--674","author":"Zhou Chong"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26190-4_2"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93034-3_44"},{"key":"e_1_2_1_149_1","volume-title":"Dey","author":"Ziebart Brian D.","year":"2008"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594473.2594476"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11161"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132956.1132959"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3399631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:32Z","timestamp":1750199612000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399631"}},"subtitle":["Algorithms, Taxonomies, Evaluation, and Open Challenges"],"short-title":[],"issued":{"date-parts":[[2020,6,21]]},"references-count":152,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9,30]]}},"alternative-id":["10.1145\/3399631"],"URL":"https:\/\/doi.org\/10.1145\/3399631","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,21]]},"assertion":[{"value":"2020-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}