{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:08:22Z","timestamp":1769843302035,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,10]]},"DOI":"10.1145\/3603269.3604866","type":"proceedings-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T16:16:29Z","timestamp":1693584989000},"page":"122-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Lessons from the evolution of the Batfish configuration analysis tool"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5232-7302","authenticated-orcid":false,"given":"Matt","family":"Brown","sequence":"first","affiliation":[{"name":"Intentionet, Los Angeles, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9250-7172","authenticated-orcid":false,"given":"Ari","family":"Fogel","sequence":"additional","affiliation":[{"name":"Intentionet, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0118-0931","authenticated-orcid":false,"given":"Daniel","family":"Halperin","sequence":"additional","affiliation":[{"name":"Intentionet, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8365-3717","authenticated-orcid":false,"given":"Victor","family":"Heorhiadi","sequence":"additional","affiliation":[{"name":"Intentionet, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8005-6948","authenticated-orcid":false,"given":"Ratul","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Intentionet, Seattle, United States of America"},{"name":"University of Washington, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2031-1514","authenticated-orcid":false,"given":"Todd","family":"Millstein","sequence":"additional","affiliation":[{"name":"Intentionet, Los Angeles, United States of America"},{"name":"UCLA, Los Angeles, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Tiramisu: Fast Multilayer Network Verification. In NSDI.","author":"Abhashkumar Anubhavnidhi","year":"2020","unstructured":"Anubhavnidhi Abhashkumar, Aaron Gember-Jacobson, and Aditya Akella. 2020. Tiramisu: Fast Multilayer Network Verification. In NSDI."},{"key":"e_1_3_2_1_2_1","volume-title":"Binary Decision Diagrams","year":"1978","unstructured":"Akers. 1978. Binary Decision Diagrams. IEEE Trans. Comput. (1978)."},{"key":"e_1_3_2_1_3_1","unstructured":"E.S. Al-Shaer and H.H. Hamed. 2004. Discovery of Policy Anomalies in Distributed Firewalls. In INFOCOM."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"John Backes S. Bayless Byron Cook C. Dodge Andrew Gacek A.J. Hu T. Kahsai B. Kocik E. Kotelnikov J. Kukovec Sean McLaughlin J. Reed Neha Rungta J. Sizemore M. Stalzer P. Srinivasan P. Suboti Carsten Varming and B. Whaley. 2019. Reachability Analysis for AWS-based networks. In CAV.","DOI":"10.1007\/978-3-030-25543-5_14"},{"key":"e_1_3_2_1_5_1","volume":"201","author":"Bayless Sam","unstructured":"Sam Bayless, Noah Bayless, Holger H. Hoos, and Alan J. Hu. 2015. SAT Modulo Monotonic Theories. In AAAI.","journal-title":"Alan J. Hu."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Ryan Beckett Aarti Gupta Ratul Mahajan and David Walker. 2017. A General Approach to Network Configuration Verification. In SIGCOMM.","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Ryan Beckett Aarti Gupta Ratul Mahajan and David Walker. 2018. Control Plane Compression. In SIGCOMM.","DOI":"10.1145\/3230543.3230583"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Ryan Beckett and Ratul Mahajan. 2020. A General Framework for Compositional Network Modeling. In HotNets.","DOI":"10.1145\/3422604.3425930"},{"key":"e_1_3_2_1_9_1","volume-title":"Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, and Dawson Engler.","author":"Bessey Al","year":"2010","unstructured":"Al Bessey, Ken Block, Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, and Dawson Engler. 2010. A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World. Commun. ACM (2010)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Cristiano Calcagno Dino Distefano Jeremy Dubreil Dominik Gabi Pieter Hooimeijer Martino Luca Peter O'Hearn Irene Papakonstantinou Jim Purbrick and Dulma Rodriguez. 2015. Moving Fast with Software Verification. In NASA Formal Methods.","DOI":"10.1007\/978-3-319-17524-9_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Antonio Ceseracciu. 2020. Safe ACL Change through Model-based Analysis. https:\/\/tech.ebayinc.com\/engineering\/safe-acl-change-through-model-based-analysis\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Seyed K. Fayaz Tushar Sharma Ari Fogel Ratul Mahajan Todd Millstein Vyas Sekar and George Varghese. 2016. Efficient Network Reachability Analysis Using a Succinct Control Plane Representation. In OSDI."},{"key":"e_1_3_2_1_14_1","unstructured":"Nick Feamster and Hari Balakrishnan. 2005. Detecting BGP Configuration Faults with Static Analysis. In NSDI."},{"key":"e_1_3_2_1_15_1","volume-title":"The Synchronization of Periodic Routing Messages. SIGCOMM Computer Communication Review (CCR)","author":"Floyd Sally","year":"1993","unstructured":"Sally Floyd and Van Jacobson. 1993. The Synchronization of Periodic Routing Messages. SIGCOMM Computer Communication Review (CCR) (1993)."},{"key":"e_1_3_2_1_16_1","unstructured":"Ari Fogel Stanley Fung Luis Pedrosa Meg Walraed-Sullivan Ramesh Govindan Ratul Mahajan and Todd Millstein. 2015. A General Approach to Network Configuration Analysis. In NSDI."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.87281"},{"key":"e_1_3_2_1_18_1","volume-title":"The State of Network Operation Through Automation \/ NetDevOps Survey","author":"Garros Damien","year":"2019","unstructured":"Damien Garros. 2020. The State of Network Operation Through Automation \/ NetDevOps Survey 2019. https:\/\/blog.networktocode.com\/post\/state-network-operations-netdevops-survey-2019\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Aaron Gember-Jacobson Raajay Viswanathan Aditya Akella and Ratul Mahajan. 2016. Fast Control Plane Analysis Using an Abstract Representation. In SIGCOMM.","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Aaron Gember-Jacobson Raajay Viswanathan Aditya Akella and Ratul Mahajan. 2016. Fast Control Plane Analysis Using an Abstract Representation. In SIGCOMM.","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/AAI28094993"},{"key":"e_1_3_2_1_22_1","volume-title":"d.]. GNS3 | The Software that Empowers Network Professionals. https:\/\/www.gns3.com\/. Retrieved","year":"2023","unstructured":"gns3 [n. d.]. GNS3 | The Software that Empowers Network Professionals. https:\/\/www.gns3.com\/. Retrieved February 2023."},{"key":"e_1_3_2_1_23_1","volume-title":"Flash: Fast, Consistent Data Plane Verification for Large-Scale Network Settings. In SIGCOMM.","author":"Guo Dong","year":"2022","unstructured":"Dong Guo, Shenshen Chen, Kai Gao, Qiao Xiang, Ying Zhang, and Y. Richard Yang. 2022. Flash: Fast, Consistent Data Plane Verification for Large-Scale Network Settings. In SIGCOMM."},{"key":"e_1_3_2_1_24_1","volume-title":"Prasad","author":"Horn Alex","year":"2017","unstructured":"Alex Horn, Ali Kheradmand, and Mukul R. Prasad. 2017. Delta-Net: Real-Time Network Verification Using Atoms. In NSDI."},{"key":"e_1_3_2_1_25_1","volume-title":"Monti","author":"Huisman Marieke","year":"2020","unstructured":"Marieke Huisman and Ra\u00fal E. Monti. 2020. On the Industrial Application of Critical Software Verification with VerCors. In Leveraging Applications of Formal Methods, Verification and Validation: Applications."},{"key":"e_1_3_2_1_26_1","volume-title":"Neha Milind Raje, and Parag Sharma.","author":"Jayaraman Karthick","year":"2019","unstructured":"Karthick Jayaraman, Nikolaj Bj\u00f8rner, Jitu Padhye, Amar Agrawal, Ashish Bhargava, Paul-Andre C Bissonnette, Shane Foster, Andrew Helwer, Mark Kasten, Ivan Lee, Anup Namdhari, Haseeb Niaz, Aniruddha Parkhi, Hanukumar Pinnamraju, Adrian Power, Neha Milind Raje, and Parag Sharma. 2019. Validating Datacenters at Scale. In SIGCOMM."},{"key":"e_1_3_2_1_27_1","volume-title":"Jensen and Bjarne Toft","author":"Tommy","year":"1994","unstructured":"Tommy R. Jensen and Bjarne Toft. 1994. Graph Coloring Problems."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Theo Jepsen Ali Fattaholmanan Masoud Moshref Nate Foster Antonio Carzaniga and Robert Soul\u00e9. 2020. Forwarding and Routing with Packet Subscriptions. In CoNEXT.","DOI":"10.1145\/3386367.3431315"},{"key":"e_1_3_2_1_29_1","unstructured":"Siva Kesava Reddy Kakarla Alan Tang Ryan Beckett Karthick Jayaraman Todd Millstein Yuval Tamir and George Varghese. 2020. Finding Network Misconfigurations by Automatic Template Inference. In NSDI."},{"key":"e_1_3_2_1_30_1","unstructured":"Jeff Kala. 2022. Developing Batfish. http:\/\/blog.networktocode.com\/post\/batfish-development-part1\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Michael Kashin. 2018. Network CI\/CD Part 3 - Building a network CI pipeline with Gitlab Ansible cEOS Robot Framework and Batfish. https:\/\/aristanetworks.force.com\/AristaCommunity\/s\/article\/network-ci-part-3."},{"key":"e_1_3_2_1_32_1","unstructured":"Peyman Kazemian Michael Chang Hongyi Zeng George Varghese Nick McKeown and Scott Whyte. 2013. Real Time Network Policy Checking Using Header Space Analysis. In NSDI."},{"key":"e_1_3_2_1_33_1","unstructured":"Peyman Kazemian George Varghese and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In NSDI."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Ahmed Khurshid Xuan Zou Wenxuan Zhou Matthew Caesar and P. Brighten Godfrey. 2013. VeriFlow: Verifying Network-wide Invariants in Real Time. In NSDI.","DOI":"10.1145\/2342441.2342452"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Gary A. Kildall. 1973. A Unified Approach to Global Program Optimization. In POPL.","DOI":"10.1145\/512927.512945"},{"key":"e_1_3_2_1_36_1","volume-title":"Time, Clocks, and the Ordering of Events in a Distributed System. Commun. ACM","author":"Lamport Leslie","year":"1978","unstructured":"Leslie Lamport. 1978. Time, Clocks, and the Ordering of Events in a Distributed System. Commun. ACM (1978)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Guyue Liu Ao Li Christopher Canel and Vyas Sekar. 2021. Watching the Watchmen: Least Privilege for Managed Network Services. In HotNets.","DOI":"10.1145\/3484266.3487380"},{"key":"e_1_3_2_1_38_1","unstructured":"Hongqiang Harry Liu Yibo Zhu Jitu Padhye Jiaxin Cao Sri Tallapragada Nuno P. Lopes Andrey Rybalchenko Guohan Lu and Lihua Yuan. 2017. CrystalNet: Faithfully Emulating Large Production Networks. In SOSP."},{"key":"e_1_3_2_1_39_1","volume-title":"d.]. Source Level Debugging with LLVM. https:\/\/llvm.org\/docs\/SourceLevelDebugging.html. Retrieved","year":"2023","unstructured":"llvm-debug [n. d.]. Source Level Debugging with LLVM. https:\/\/llvm.org\/docs\/SourceLevelDebugging.html. Retrieved February 2023."},{"key":"e_1_3_2_1_40_1","unstructured":"LogicBlox Inc. 2015. LogicBlox 4 Reference Manual. https:\/\/developer.logicblox.com\/content\/docs4\/core-reference\/html\/index.html."},{"key":"e_1_3_2_1_41_1","volume-title":"Declarative Networking: Language, Execution and Optimization. In SIGMOD.","author":"Loo Boon Thau","year":"2006","unstructured":"Boon Thau Loo, Tyson Condie, Minos Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, and Ion Stoica. 2006. Declarative Networking: Language, Execution and Optimization. In SIGMOD."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"e_1_3_2_1_43_1","unstructured":"Nuno P. Lopes Nikolaj Bjorner Patrice Godefroid Karthick Jayaraman and George Varghese. 2015. Checking Beliefs in Dynamic Networks. In NSDI."},{"key":"e_1_3_2_1_44_1","volume-title":"Lopes and Andrey Rybalchenko","author":"Nuno","year":"2019","unstructured":"Nuno P. Lopes and Andrey Rybalchenko. 2019. Fast BGP Simulation of Large Datacenters. In Verification, Model Checking, and Abstract Interpretation (VMCAI)."},{"key":"e_1_3_2_1_45_1","unstructured":"Haohui Mai Ahmed Khurshid Rachit Agarwal Matthew Caesar P. Brighten Godfrey and Samuel Talmadge King. [n. d.]. Debugging the Data Plane with Anteater. In SIGCOMM."},{"key":"e_1_3_2_1_46_1","unstructured":"Joel McGuire. 2021. Developing Batfish. https:\/\/joelmcguire1.medium.com\/building-a-new-ipam-system-using-netbox-and-batfish-ad1e91ff3503."},{"key":"e_1_3_2_1_47_1","volume-title":"The Margrave Tool for Firewall Analysis. In Large Installation System Administration Conference (LISA).","author":"Nelson Timothy","year":"2010","unstructured":"Timothy Nelson, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. 2010. The Margrave Tool for Firewall Analysis. In Large Installation System Administration Conference (LISA)."},{"key":"e_1_3_2_1_48_1","volume-title":"d.]. Oracle Cloud Network Path Analyzer. https:\/\/docs.oracle.com\/en-us\/iaas\/Content\/Network\/Concepts\/path_analyzer.htm. Retrieved","year":"2023","unstructured":"oracle-path-analyzer [n. d.]. Oracle Cloud Network Path Analyzer. https:\/\/docs.oracle.com\/en-us\/iaas\/Content\/Network\/Concepts\/path_analyzer.htm. Retrieved February 2023."},{"key":"e_1_3_2_1_49_1","unstructured":"Aurojit Panda Ori Lahav Katerina Argyraki Mooly Sagiv and Scott Shenker. 2017. Verifying Reachability in Networks with Mutable Datapaths. In NSDI."},{"key":"e_1_3_2_1_50_1","volume-title":"Quong","author":"Parr Terence J.","year":"1995","unstructured":"Terence J. Parr and Russell W. Quong. 1995. ANTLR: A Predicated-LL (k) Parser Generator. Software: Practice and Experience (1995)."},{"key":"e_1_3_2_1_51_1","volume-title":"Willem Penninckx, Jan Smans, Bart Jacobs, and Frank Piessens.","author":"Philippaerts Pieter","year":"2014","unstructured":"Pieter Philippaerts, Jan Tobias M\u00fchlberg, Willem Penninckx, Jan Smans, Bart Jacobs, and Frank Piessens. 2014. Software verification with VeriFast: Industrial case studies. Science of Computer Programming (2014)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_1_53_1","unstructured":"Jorge Romero. 2020. Using Gitlab Runners in Network Pipelines. https:\/\/www.linkedin.com\/pulse\/using-gitlab-runners-network-pipelines-jorge-romero\/."},{"key":"e_1_3_2_1_54_1","unstructured":"slack-batfish-general [n. d.]. #general. https:\/\/batfish-org.slack.com\/archives\/C8XKQNHAQ."},{"key":"e_1_3_2_1_55_1","unstructured":"slack-ntc-batfish [n. d.]. #batfish. https:\/\/networktocode.slack.com\/archives\/CCE02JK7T."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Serena Spinoso Matteo Virgilio Wolfgang John Antonio Manzalini Guido Marchetto and Riccardo Sisto. 2015. Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context. In Service Oriented and Cloud Computing.","DOI":"10.1007\/978-3-319-24072-5_18"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Radu Stoenescu Matei Popovici Lorina Negreanu and Costin Raiciu. 2016. Sym-Net: Scalable Symbolic Execution for Modern Networks. In SIGCOMM.","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_1_58_1","volume-title":"Ryan Beckett, Ennan Zhai, Matt Brown, Todd Millstein, Yuval Tamir, and George Varghese.","author":"Tang Alan","year":"2021","unstructured":"Alan Tang, Siva Kesava Reddy Kakarla, Ryan Beckett, Ennan Zhai, Matt Brown, Todd Millstein, Yuval Tamir, and George Varghese. 2021. Campion: Debugging Router Configuration Differences. In SIGCOMM."},{"key":"e_1_3_2_1_59_1","unstructured":"Nathan Winemiller. 2021. Batfish Configuration Validation Testing. https:\/\/www.dropbox.com\/scl\/fi\/3jw64qfnlfwqc0051brls\/Batfish-Configuration-Validation-Testing.paper?dl=0&rlkey=bw8rjngcfsatfv5s6g2vmqytn."},{"key":"e_1_3_2_1_60_1","unstructured":"Xieyang Xu Weixin Deng Ryan Beckett Ratul Mahajan and David Walker. 2023. Test Coverage for Network Configurations. In NSDI."},{"key":"e_1_3_2_1_61_1","volume-title":"International Conference on Network Protocols (ICNP).","author":"Yang Hongkun","unstructured":"Hongkun Yang and Simon S. Lam. 2013. Real-time verification of network properties using Atomic Predicates. In International Conference on Network Protocols (ICNP)."},{"key":"e_1_3_2_1_62_1","volume-title":"Lam","author":"Yang Hongkun","year":"2017","unstructured":"Hongkun Yang and Simon S. Lam. 2017. Scalable Verification of Networks With Packet Transformers Using Atomic Predicates. IEEE\/ACM Transactions on Networking (2017)."},{"key":"e_1_3_2_1_63_1","volume-title":"Bingchuan Tian, Qiaobo Ye, Chunsheng Wang, Xin Wu, Tianchen Guo, Cheng Jin, Duncheng She, Qing Ma, Biao Cheng, Hui Xu, Ming Zhang, Zhiliang Wang, and Rodrigo Fonseca.","author":"Ye Fangdan","year":"2020","unstructured":"Fangdan Ye, Da Yu, Ennan Zhai, Hongqiang Harry Liu, Bingchuan Tian, Qiaobo Ye, Chunsheng Wang, Xin Wu, Tianchen Guo, Cheng Jin, Duncheng She, Qing Ma, Biao Cheng, Hui Xu, Ming Zhang, Zhiliang Wang, and Rodrigo Fonseca. 2020. Accuracy, Scalability, Coverage: A Practical Configuration Verifier on a Global WAN. In SIGCOMM."},{"key":"e_1_3_2_1_64_1","volume-title":"FIREMAN: A Toolkit for Firewall Modeling and Analysis. In IEEE Symposium on Security and Privacy.","author":"Yuan Lihua","unstructured":"Lihua Yuan, Hao Chen, Jianning Mai, Chen-Nee Chuah, Zhendong Su, and P. Mohapatra. 2006. FIREMAN: A Toolkit for Firewall Modeling and Analysis. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_65_1","volume-title":"Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks. In NSDI.","author":"Zeng Hongyi","year":"2014","unstructured":"Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, and Amin Vahdat. 2014. Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks. In NSDI."}],"event":{"name":"ACM SIGCOMM '23: ACM SIGCOMM 2023 Conference","location":"New York NY USA","acronym":"ACM SIGCOMM '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2023 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603269.3604866","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603269.3604866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:42Z","timestamp":1750178802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603269.3604866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":65,"alternative-id":["10.1145\/3603269.3604866","10.1145\/3603269"],"URL":"https:\/\/doi.org\/10.1145\/3603269.3604866","relation":{},"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"2023-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}