{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:49:12Z","timestamp":1762325352904,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":88,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"German Research Foundation","award":["SI 2171\/2, SI 2171\/3-1, AP 206\/11-1, 389792660"],"award-info":[{"award-number":["SI 2171\/2, SI 2171\/3-1, AP 206\/11-1, 389792660"]}]},{"name":"NASA","award":["80NSSC20K1720, 521418-SC"],"award-info":[{"award-number":["80NSSC20K1720, 521418-SC"]}]},{"name":"NSF","award":["2007202, 2038080, 2107463"],"award-info":[{"award-number":["2007202, 2038080, 2107463"]}]},{"name":"Software Engineering Institute"},{"name":"German Federal Ministry of Education and Research","award":["01IS19059A, 01IS18026B"],"award-info":[{"award-number":["01IS19059A, 01IS18026B"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510043","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"1571-1583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["On debugging the performance of configurable software systems"],"prefix":"10.1145","author":[{"given":"Miguel","family":"Velez","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Pooyan","family":"Jamshidi","sequence":"additional","affiliation":[{"name":"University of South Carolina"}]},{"given":"Norbert","family":"Siegmund","sequence":"additional","affiliation":[{"name":"Leipzig University"}]},{"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"Saarland University"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Variability Bugs in Highly Configurable Systems","volume":"26","author":"Abal Iago","year":"2018","unstructured":"Iago Abal, Jean Melo, \u015etefan St\u0103nciulescu, Claus Brabrand, M\u00e1rcio Ribeiro, and Andrzej W\u0105sowski. 2018. Variability Bugs in Highly Configurable Systems: A Qualitative Analysis. ACM Trans. Softw. Eng. Methodol. (TOSEM) 26, 3, Article 10 (Jan. 2018), 34 pages.","journal-title":"A Qualitative Analysis. ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879224"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/93548.93576"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064186"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_5"},{"volume-title":"Int'l Conf. Software Analysis, Evolution, and Reengineering (SANER) (Montreal, Canada)","author":"Bezemer Cor-Paul","key":"e_1_3_2_1_6_1","unstructured":"Cor-Paul Bezemer, J.A. Pouwelse, and Brendan Gregg. 2015. Understanding Software Performance Regressions Using Differential Flame Graphs. In Int'l Conf. Software Analysis, Evolution, and Reengineering (SANER) (Montreal, Canada). IEEE, Los Alamitos, CA, USA, 535--539."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276519"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718973"},{"volume-title":"Proc. Symposium User Interface Software and Technology (UIST) (St. Andrews","author":"Burg Brian","key":"e_1_3_2_1_9_1","unstructured":"Brian Burg, Richard Bailey, Andrew J. Ko, and Michael D. Ernst. 2013. Interactive Record\/Replay for Web Application Debugging. In Proc. Symposium User Interface Software and Technology (UIST) (St. Andrews, Scotland, United Kingdom). ACM, New York, NY, USA, 473--484."},{"key":"e_1_3_2_1_10_1","article-title":"CERE: LLVM-Based Codelet Extractor and REplayer for Piecewise Benchmarking and Optimization","volume":"12","author":"Oliveira Castro Pablo De","year":"2015","unstructured":"Pablo De Oliveira Castro, Chadi Akel, Eric Petit, Mihail Popov, and William Jalby. 2015. CERE: LLVM-Based Codelet Extractor and REplayer for Piecewise Benchmarking and Optimization. ACM Trans. Archit. Code Optim. (TACO) 12, 1, Article 6 (April 2015), 24 pages.","journal-title":"ACM Trans. Archit. Code Optim. (TACO)"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106285"},{"volume-title":"Proc. Int'l Conf. Software Engineering: Companion Proceeedings","author":"Cito J\u00fcrgen","key":"e_1_3_2_1_12_1","unstructured":"J\u00fcrgen Cito, Philipp Leitner, Christian Bosshard, Markus Knecht, Genc Mazlami, and Harald C. Gall. 2018. PerformanceHat: Augmenting Source Code with Runtime Performance Traces in the IDE. In Proc. Int'l Conf. Software Engineering: Companion Proceeedings (Gothenburg, Sweden). ACM, New York, NY, USA, 41--44."},{"volume-title":"USENIX Annual Technical Conference (ATC). USENIX Association","author":"Curtsinger Charlie","key":"e_1_3_2_1_13_1","unstructured":"Charlie Curtsinger and Emery D. Berger. 2016. COZ: Finding Code that Counts with Causal Profiling. In USENIX Annual Technical Conference (ATC). USENIX Association, Denver, CO, USA, 184--197."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0950-7051(93)90017-N"},{"volume-title":"EJ-technologies. Retrieved","year":"2019","key":"e_1_3_2_1_15_1","unstructured":"EJ-technologies. 2019. JProfiler 10. EJ-technologies. Retrieved December 10, 2019 from https:\/\/www.ej-technologies.com\/products\/jprofiler\/overview.html"},{"volume-title":"Int'l Conf. Communication, Computing and Digital systems (C-CODE) (Islamabad, Pakistan)","author":"Farooqui Tayba","key":"e_1_3_2_1_16_1","unstructured":"Tayba Farooqui, Tauseef Rana, and Fakeeha Jafari. 2019. Impact of Human-Centered Design Process (HCDP) on Software Development Process. In Int'l Conf. Communication, Computing and Digital systems (C-CODE) (Islamabad, Pakistan). IEEE, Los Alamitos, CA, USA, 110--114."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417920"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-010-9114-7"},{"key":"e_1_3_2_1_20_1","unstructured":"Alexander Grebhahn Norbert Siegmund and Sven Apel. 2019. Predicting Performance of Software Configurations: There is no Silver Bullet. arXiv:1911.12643 [cs.SE]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909476"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00113"},{"volume-title":"Proc. Int'l Conf. Software Maintance and Evolution (ICSME). IEEE","author":"Ha H.","key":"e_1_3_2_1_24_1","unstructured":"H. Ha and H. Zhang. 2019. Performance-Influence Model for Highly Configurable Software with Fourier Learning and Lasso Regression. In Proc. Int'l Conf. Software Maintance and Evolution (ICSME). IEEE, Los Alamitos, CA, USA, 470--480."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227198"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962602"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238204"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427921.3450255"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416531"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519575"},{"volume-title":"Think-aloud protocol","author":"J\u00e4\u00e4skel\u00e4inen Riitta","key":"e_1_3_2_1_31_1","unstructured":"Riitta J\u00e4\u00e4skel\u00e4inen. 2010. Think-aloud protocol. John Benjamins Publishing Amsterdam\/Philadelphia, Amsterdam. 371--374 pages."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048081"},{"key":"e_1_3_2_1_34_1","volume-title":"G\u00f3mez","author":"Juristo Natalia","year":"2011","unstructured":"Natalia Juristo and Omar S. G\u00f3mez. 2011. Replication of Software Engineering Experiments. Springer Berlin Heidelberg, Berlin, Heidelberg, 60--88."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2987024"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00112"},{"volume-title":"Proc. Conf Human Factors in Computing Systems (CHI)","author":"Andrew","key":"e_1_3_2_1_37_1","unstructured":"Andrew J. Ko and Brad A. Myers. 2004. Designing the Whyline: A Debugging Interface for Asking Questions about Program Behavior. In Proc. Conf Human Factors in Computing Systems (CHI) (Vienna, Austria). ACM, New York, NY, USA, 151--158."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-018-0662-9"},{"key":"e_1_3_2_1_39_1","volume-title":"Dynamic Program Slicing. Information processing letters 29, 3","author":"Korel Bogdan","year":"1988","unstructured":"Bogdan Korel and Janusz Laski. 1988. Dynamic Program Slicing. Information processing letters 29, 3 (1988), 155--163."},{"volume-title":"Int'l Workshop Source Code Analysis and Manipulation (SCAM)","author":"Krinke Jens","key":"e_1_3_2_1_40_1","unstructured":"Jens Krinke. 2003. Barrier Slicing and Chopping. In Int'l Workshop Source Code Analysis and Manipulation (SCAM). IEEE, Amsterdam, Netherlands, 81--87."},{"key":"e_1_3_2_1_41_1","volume-title":"Mohammad Ali Javidian, Baishakhi Ray, and Pooyan Jamshidi.","author":"Krishna Rahul","year":"2020","unstructured":"Rahul Krishna, Md Shahriar Iqbal, Mohammad Ali Javidian, Baishakhi Ray, and Pooyan Jamshidi. 2020. CADET: A Systematic Method For Debugging Misconfigurations using Counterfactual Reasoning. arXiv:2010.06061 [cs.SE]"},{"volume-title":"Visualizing Call Graphs. In Symposium Visual Languages and Human-Centric Computing (VL\/HCC). IEEE","author":"LaToza T. D.","key":"e_1_3_2_1_42_1","unstructured":"T. D. LaToza and B. A. Myers. 2011. Visualizing Call Graphs. In Symposium Visual Languages and Human-Centric Computing (VL\/HCC). IEEE, Los Alamitos, CA, USA, 117--124."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387520"},{"volume-title":"Proc. Int'l Conf. Software Engineering (ICSE)","author":"Li Ding","key":"e_1_3_2_1_44_1","unstructured":"Ding Li, Yingjun Lyu, Jiaping Gui, and William G.J. Halfond. 2016. Automated Energy Optimization of HTTP Requests for Mobile Applications. In Proc. Int'l Conf. Software Engineering (ICSE) (Austin, TX, USA). ACM, New York, NY, USA, 249--260."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2756048"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568229"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970322"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884831"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.34"},{"key":"e_1_3_2_1_51_1","first-page":"7","article-title":"Programmers Are Users Too","volume":"49","author":"Myers Brad A.","year":"2016","unstructured":"Brad A. Myers, Andrew J. Ko, Thomas D. LaToza, and YoungSeok Yoon. 2016. Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools. Computer 49, 7 (July 2016), 44--52.","journal-title":"Human-Centered Methods for Improving Programming Tools. Computer"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106238"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.100"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624035"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606602"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106273"},{"volume-title":"Proc. Int'l Conf. Mining Software Repositories","author":"Park J.","key":"e_1_3_2_1_58_1","unstructured":"J. Park, M. Kim, B. Ray, and D. Bae. 2012. An Empirical Study of Supplementary Bug Fixes. In Proc. Int'l Conf. Mining Software Repositories (Zurich, Switzerland). IEEE, Los Alamitos, CA, USA, 40--49."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297067"},{"volume-title":"The Coding Manual for Qualitative Researchers","author":"Salda\u00f1a Johnny","key":"e_1_3_2_1_61_1","unstructured":"Johnny Salda\u00f1a. 2015. The Coding Manual for Qualitative Researchers. Sage, London, England."},{"volume-title":"Performance Evolution Matrix: Visualizing Performance Variations Along Software Versions. In Conf. Software Visualization (VISSOFT). IEEE","author":"Sandoval Alcocer J. P.","key":"e_1_3_2_1_62_1","unstructured":"J. P. Sandoval Alcocer, F. Beck, and A. Bergel. 2019. Performance Evolution Matrix: Visualizing Performance Variations Along Software Versions. In Conf. Software Visualization (VISSOFT). IEEE, Los Alamitos, CA, USA, 1--11."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0015108"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227196"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9152-9"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660234"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.41"},{"key":"e_1_3_2_1_69_1","volume-title":"Proc. European Conf. Object-Oriented Programming (ECOOP). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik","author":"Toman John","year":"2016","unstructured":"John Toman and Dan Grossman. 2016. Staccato: A Bug Finder for Dynamic Configuration Updates. In Proc. European Conf. Object-Oriented Programming (ECOOP). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 1--23."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613833"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00273-8"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00100"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Miguel Velez Pooyan Jamshidi Norbert Siegmund Sven Apel and Christian K\u00e4stner. 2022. On Debugging the Performance of Configurable Software Systems: Developer Needs and Tailored Tool Support - Supplementary Material - https:\/\/bit.ly\/35HUvl9.","DOI":"10.1145\/3510003.3510043"},{"key":"e_1_3_2_1_74_1","volume-title":"VisualVM. Retrieved","author":"VM.","year":"2020","unstructured":"VisualVM. 2020. VisualVM. VisualVM. Retrieved November 24, 2020 from https:\/\/visualvm.github.io\/"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173206"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00099"},{"key":"e_1_3_2_1_77_1","volume-title":"Program Slicing. In Proc. Int'l Conf. Software Engineering (ICSE)","author":"Weiser Mark","year":"1981","unstructured":"Mark Weiser. 1981. Program Slicing. In Proc. Int'l Conf. Software Engineering (ICSE) (San Diego, CA, USA). IEEE, Piscataway, NJ, USA, 439--449."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.45"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276487"},{"key":"e_1_3_2_1_80_1","first-page":"1","article-title":"A Brief Survey of Program Slicing","volume":"30","author":"Xu Baowen","year":"2005","unstructured":"Baowen Xu, Ju Qian, Xiaofang Zhang, Zhongqiang Wu, and Lin Chen. 2005. A Brief Survey of Program Slicing. ACM SIGSOFT Software Engineering Notes 30, 2 (2005), 1--36.","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"e_1_3_2_1_81_1","volume-title":"Proc. Conf. Operating Systems Design and Implementation (OSDI)","author":"Xu Tianyin","year":"2016","unstructured":"Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, and Shankar Pasupathy. 2016. Early Detection of Configuration Errors to Reduce Failure Damage. In Proc. Conf. Operating Systems Design and Implementation (OSDI) (Savannah, GA, USA). USENIX Association, Berkeley, CA, USA, 619--634."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931070"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9578-1"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/318774.318946"},{"volume-title":"Why Programs Fail: A Guide to Systematic Debugging","author":"Zeller Andreas","key":"e_1_3_2_1_86_1","unstructured":"Andreas Zeller. 2009. Why Programs Fail: A Guide to Systematic Debugging. Elsevier, Amsterdam, The Netherlands."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541983"},{"volume-title":"Proc. Int'l Conf. Software Engineering (ICSE)","author":"Zhang Sai","key":"e_1_3_2_1_88_1","unstructured":"Sai Zhang and Michael D. Ernst. 2014. Which Configuration Option Should I Change?. In Proc. Int'l Conf. Software Engineering (ICSE) (Hyderabad, India). ACM, New York, NY, USA, 152--163."},{"volume-title":"Proc. Int'l Symp. Software Testing and Analysis (ISSTA)","author":"Zhang Sai","key":"e_1_3_2_1_89_1","unstructured":"Sai Zhang and Michael D. Ernst. 2015. Proactive Detection of Inadequate Diagnostic Messages for Software Configuration Errors. In Proc. Int'l Symp. Software Testing and Analysis (ISSTA) (Baltimore, MD, USA). ACM, New York, NY, USA, 12--23."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3128605"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Pittsburgh Pennsylvania","acronym":"ICSE '22"},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510043","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:04Z","timestamp":1750191124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510043"}},"subtitle":["developer needs and tailored tool support"],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":88,"alternative-id":["10.1145\/3510003.3510043","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510043","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}