{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:41:33Z","timestamp":1757612493823,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["389792660, 390696704"],"award-info":[{"award-number":["389792660, 390696704"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["VI.Veni.222.431"],"award-info":[{"award-number":["VI.Veni.222.431"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,6]]},"DOI":"10.1145\/3716863.3718049","type":"proceedings-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:20:33Z","timestamp":1747808433000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Explaining Control Policies through Predicate Decision Diagrams"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0978-4457","authenticated-orcid":false,"given":"Debraj","family":"Chakraborty","sequence":"first","affiliation":[{"name":"Masaryk University, Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5718-8276","authenticated-orcid":false,"given":"Clemens","family":"Dubslaff","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6078-4175","authenticated-orcid":false,"given":"Sudeep","family":"Kanav","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8122-2881","authenticated-orcid":false,"given":"Jan","family":"Kretinsky","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Republic, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1600-4933","authenticated-orcid":false,"given":"Christoph","family":"Weinhuber","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Ethics Guidelines for Trustworthy AI - European Commission Directorate-General for Communications Networks Content and Technology. https:\/\/data.europa.eu\/doi\/10.2759\/177365."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8312-draft"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Proposal for a Regulation laying down harmonised rules on artificial intelligence (Artificial Intelligence Act) and amending certain Union legislative acts COM(2021) 206 final - European Commission. https:\/\/ec.europa.eu\/transparency\/regdoc\/rep\/1\/2021\/EN\/COM-2021-206-F1-EN-MAIN-PART-1.PDF."},{"key":"e_1_3_2_1_4_1","volume-title":"Peeking inside the black-box: a survey on explainable artificial intelligence (XAI)","author":"Adadi Amina","year":"2018","unstructured":"Amina Adadi and Mohammed Berrada. 2018. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE access 6 (2018), 52138--52160."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30281-8_7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365365.3383468"},{"volume-title":"TACAS (2) (Lecture Notes in Computer Science","author":"Ashok Pranav","key":"e_1_3_2_1_7_1","unstructured":"Pranav Ashok, Mathias Jackermeier, Jan Kret\u00ednsk\u00fd, Christoph Weinhuber, Maximilian Weininger, and Mayank Yadav. 2021. dtControl 2.0: Explainable Strategy Representation via Decision Tree Learning Steered by Experts. In TACAS (2) (Lecture Notes in Computer Science, Vol. 12652). Springer, 326--345."},{"key":"e_1_3_2_1_8_1","volume-title":"Adrien Le Co\u00ebnt, Jakob Haahr Taankvist, and Maximilian Weininger.","author":"Ashok Pranav","year":"2019","unstructured":"Pranav Ashok, Jan K\u0159et\u00ednsk\u00fd, Kim Guldstrand Larsen, Adrien Le Co\u00ebnt, Jakob Haahr Taankvist, and Maximilian Weininger. 2019. SOS: Safe, Optimal and Small Strategies for Hybrid Markov Decision Processes. In QEST (Lecture Notes in Computer Science, Vol. 11785). Springer, 147--164."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008699807402"},{"volume-title":"Handbook of Satisfiability","author":"Barrett Clark","key":"e_1_3_2_1_10_1","unstructured":"Clark Barrett, Roberto Sebastiani, Sanjit Seshia, and Cesare Tinelli. 2021. Satisfiability Modulo Theories. In Handbook of Satisfiability, Second Edition, Armin Biere, Marijn J. H. Heule, Hans van Maaren, and Toby Walsh (Eds.). Frontiers in Artificial Intelligence and Applications, Vol. 336. IOS Press, Chapter 33, 825--885. http:\/\/theory.stanford.edu\/~barrett\/pubs\/BSST21.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.537122"},{"key":"e_1_3_2_1_12_1","unstructured":"Craig Boutilier Richard Dearden and Mois\u00e9s Goldszmidt. 1995. Exploiting Structure in Policy Construction. In IJCAI. Morgan Kaufmann 1104--1113."},{"volume-title":"CAV (1) (Lecture Notes in Computer Science","author":"Br\u00e1zdil Tom\u00e1s","key":"e_1_3_2_1_13_1","unstructured":"Tom\u00e1s Br\u00e1zdil, Krishnendu Chatterjee, Martin Chmelik, Andreas Fellner, and Jan K\u0159et\u00ednsk\u00fd. 2015. Counterexample Explanation by Learning Small Strategies in Markov Decision Processes. In CAV (1) (Lecture Notes in Computer Science, Vol. 9206). Springer, 158--177."},{"volume-title":"TACAS (1) (Lecture Notes in Computer Science","author":"Br\u00e1zdil Tom\u00e1s","key":"e_1_3_2_1_14_1","unstructured":"Tom\u00e1s Br\u00e1zdil, Krishnendu Chatterjee, Jan K\u0159et\u00ednsk\u00fd, and Viktor Toman. 2018. Strategy Representation by Decision Trees in Reactive Synthesis. In TACAS (1) (Lecture Notes in Computer Science, Vol. 10805). Springer, 385--407."},{"key":"e_1_3_2_1_15_1","unstructured":"Leo Breiman J. H. Friedman R. A. Olshen and C. J. Stone. 1984. Classification and Regression Trees. Wadsworth."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474083"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Roberto Cavada Alessandro Cimatti Anders Franzen Krishnamani Kalyanasundaram Marco Roveri and R.K. Shyamasundar. 2007. Computing Predicate Abstractions by Integrating BDDs and SMT Solvers. In Formal Methods in Computer Aided Design (FMCAD'07). 69--76. https:\/\/doi.org\/10.1109\/FAMCAD.2007.35","DOI":"10.1109\/FAMCAD.2007.35"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2009.5351143"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Debraj Chakraborty Clemens Dubslaff Sudeep Kanav Jan Kretinsky and Christoph Weinhuber. 2025. Explaining Control Policies through Predicate Decision Diagrams. arXiv:2503.06420 [cs.AI] https:\/\/arxiv.org\/abs\/2503.06420","DOI":"10.1145\/3716863.3718049"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings, The Twentieth National Conference on Artificial Intelligence and the Seventeenth Innovative Applications of Artificial Intelligence Conference","author":"Kenil C.","year":"2005","unstructured":"Kenil C. K. Cheng and Roland H. C. Yap. 2005. Constrained Decision Diagrams. In Proceedings, The Twentieth National Conference on Artificial Intelligence and the Seventeenth Innovative Applications of Artificial Intelligence Conference, July 9-13, 2005, Pittsburgh, Pennsylvania, USA, Manuela M. Veloso and Subbarao Kambhampati (Eds.). AAAI Press \/ The MIT Press, 366--371. http:\/\/www.aaai.org\/Library\/AAAI\/2005\/aaai05-058.php"},{"volume-title":"Automatic OBDD-Based Generation of Universal Plans in Non-Deterministic Domains","author":"Cimatti Alessandro","key":"e_1_3_2_1_22_1","unstructured":"Alessandro Cimatti, Marco Roveri, and Paolo Traverso. 1998. Automatic OBDD-Based Generation of Universal Plans in Non-Deterministic Domains. In AAAI\/IAAI. AAAI Press \/ The MIT Press, 875--881."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1990.129859"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence -","volume":"826","author":"Darwiche Adnan","year":"2011","unstructured":"Adnan Darwiche. 2011. SDD: a new canonical representation of propositional knowledge bases. In Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence - Volume Volume Two (Barcelona, Catalonia, Spain) (IJCAI'11). AAAI Press, 819--826."},{"key":"e_1_3_2_1_25_1","volume-title":"Kim Guldstrand Larsen, Marius Mikucionis, and Jakob Haahr Taankvist.","author":"David Alexandre","year":"2015","unstructured":"Alexandre David, Peter Gj\u00f8l Jensen, Kim Guldstrand Larsen, Marius Mikucionis, and Jakob Haahr Taankvist. 2015. Uppaal Stratego. In TACAS (Lecture Notes in Computer Science, Vol. 9035). Springer, 206--211."},{"volume-title":"CAV (2) (Lecture Notes in Computer Science","author":"Dehnert Christian","key":"e_1_3_2_1_26_1","unstructured":"Christian Dehnert, Sebastian Junges, Joost-Pieter Katoen, and Matthias Volk. 2017. A Storm is Coming: A Modern Probabilistic Model Checker. In CAV (2) (Lecture Notes in Computer Science, Vol. 10427). Springer, 592--600."},{"key":"e_1_3_2_1_27_1","volume-title":"Informatics in Control, Automation and Robotics: Selcted Papers from the International Conference on Informatics in Control, Automation and Robotics","author":"Penna Giuseppe Della","year":"2008","unstructured":"Giuseppe Della Penna, Benedetto Intrigila, Nadia Lauri, and Daniele Magazzeni. 2009. Fast and Compact Encoding of Numerical Controllers Using OBDDs. In Informatics in Control, Automation and Robotics: Selcted Papers from the International Conference on Informatics in Control, Automation and Robotics 2008, Juan Andrade Cetto, Jean-Louis Ferrier, and Joaquim Filipe (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 75--87."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646548.3676538"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Clemens Dubslaff Verena Kl\u00f6s and Juliane P\u00e4\u00dfler. 2024. Template Decision Diagrams for Meta Control and Explainability. In Explainable Artificial Intelligence Luca Longo Sebastian Lapuschkin and Christin Seifert (Eds.). Springer Nature Switzerland Cham 219--242.","DOI":"10.1007\/978-3-031-63797-1_12"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-75778-5_12"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25920"},{"volume-title":"Logic for Programming","author":"Fontaine Pascal","key":"e_1_3_2_1_32_1","unstructured":"Pascal Fontaine and E. Pascal Gribomont. 2002. Using BDDs with Combinations of Theories. In Logic for Programming, Artificial Intelligence, and Reasoning, Matthias Baaz and Andrei Voronkov (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 190--201."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44404-1_11"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008647823331"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Pranav Garg Daniel Neider P. Madhusudan and Dan Roth. 2016. Learning invariants using decision trees and implication counterexamples. In POPL. ACM 499--512.","DOI":"10.1145\/2837614.2837664"},{"key":"e_1_3_2_1_36_1","first-page":"303","article-title":"Explicativity: a mathematical theory of explanation with statistical applications","volume":"354","author":"Good I. J.","year":"1977","unstructured":"I. J. Good. 1977. Explicativity: a mathematical theory of explanation with statistical applications. Proc. R. Soc. Lond. A354 (1977), 303--330.","journal-title":"Proc. R. Soc. Lond."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"29","author":"Gupta Ujjwal Das","year":"2015","unstructured":"Ujjwal Das Gupta, Erik Talvitie, and Michael Bowling. 2015. Policy tree: Adaptive representation for policy gradient. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 29."},{"volume-title":"TACAS(1) (Lecture Notes in Computer Science","author":"Hartmanns Arnd","key":"e_1_3_2_1_38_1","unstructured":"Arnd Hartmanns, Michaela Klauck, David Parker, Tim Quatmann, and Enno Ruijters. 2019. The Quantitative Verification Benchmark Set. In TACAS(1) (Lecture Notes in Computer Science, Vol. 11427). Springer, 344--350."},{"key":"e_1_3_2_1_39_1","volume-title":"SPUDD: Stochastic Planning using Decision Diagrams. In UAI. Morgan Kaufmann, 279--288.","author":"Hoey Jesse","year":"1999","unstructured":"Jesse Hoey, Robert St-Aubin, Alan J. Hu, and Craig Boutilier. 1999. SPUDD: Stochastic Planning using Decision Diagrams. In UAI. Morgan Kaufmann, 279--288."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V36I4.20291"},{"key":"e_1_3_2_1_41_1","volume-title":"K\u00f6hl","author":"Husung Nils","year":"2024","unstructured":"Nils Husung, Clemens Dubslaff, Holger Hermanns, and Maximilian A. K\u00f6hl. 2024. OxiDD. In Tools and Algorithms for the Construction and Analysis of Systems, Bernd Finkbeiner and Laura Kov\u00e1cs (Eds.). Springer Nature Switzerland, Cham, 255--275."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/93385.93409"},{"key":"e_1_3_2_1_43_1","volume-title":"CAV (Lecture Notes in Computer Science","volume":"569","author":"Jr Manuel Mazo","year":"2010","unstructured":"Manuel Mazo Jr., Anna Davitian, and Paulo Tabuada. 2010. PESSOA: A Tool for Embedded Controller Synthesis. In CAV (Lecture Notes in Computer Science, Vol. 6174). Springer, 566--569."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-023-00716-z"},{"volume-title":"Proc. 9th International Conference on Quantitative Evaluation of SysTems(QEST'12)","author":"Kwiatkowska M.","key":"e_1_3_2_1_45_1","unstructured":"M. Kwiatkowska, G. Norman, and D. Parker. 2012. The PRISM Benchmark Suite. In Proc. 9th International Conference on Quantitative Evaluation of SysTems(QEST'12). IEEE CS Press, 203--204."},{"key":"e_1_3_2_1_46_1","unstructured":"J\u00f8rn Lind-Nielsen. 2004. BuDDy: A binary decision diagram package version 2.4. https:\/\/buddy.sourceforge.net\/manual\/"},{"volume-title":"Symbolic Model Checking","author":"McMillan Kenneth L.","key":"e_1_3_2_1_47_1","unstructured":"Kenneth L. McMillan. 1993. Symbolic Model Checking. Springer US, Boston, MA."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"D.M. Miller. 1993. Multiple-valued logic design tools. In [1993] Proceedings of the Twenty-Third International Symposium on Multiple-Valued Logic. 2--11. https:\/\/doi.org\/10.1109\/ISMVL.1993.289589","DOI":"10.1109\/ISMVL.1993.289589"},{"volume-title":"Binary decision diagrams and applications for VLSI CAD","key":"e_1_3_2_1_49_1","unstructured":"Shin-ichi Minato. 1996. Binary decision diagrams and applications for VLSI CAD. Kluwer Academic Publishers, USA."},{"volume-title":"Machine learning","author":"Mitchell T. M.","key":"e_1_3_2_1_50_1","unstructured":"T. M. Mitchell. 1997. Machine learning. McGraw-Hill."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTKE.2012.6408575"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48168-0_9"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2007.358041"},{"volume-title":"Learning-Based Synthesis of Safety Controllers","author":"Neider Daniel","key":"e_1_3_2_1_54_1","unstructured":"Daniel Neider and Oliver Markgraf. 2019. Learning-Based Synthesis of Safety Controllers. In FMCAD. IEEE, 120--128."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the third international symposium on adaptive systems: evolutionary computation and probabilistic graphical models","volume":"2","author":"Pyeatt Larry D","year":"2001","unstructured":"Larry D Pyeatt, Adele E Howe, et al. 2001. Decision tree function approximation in reinforcement learning. In Proceedings of the third international symposium on adaptive systems: evolutionary computation and probabilistic graphical models, Vol. 2. Cuba, 70--77."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_57_1","unstructured":"J. Ross Quinlan. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/277044.277168"},{"key":"e_1_3_2_1_59_1","volume-title":"A survey of static variable ordering heuristics for efficient BDD\/MDD construction","author":"Rice Michael","year":"2008","unstructured":"Michael Rice and Sanjay Kulhari. 2008. A survey of static variable ordering heuristics for efficient BDD\/MDD construction. University of California, Tech. Rep (2008), 130."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1993.580029"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2883817.2883834"},{"volume-title":"Automated Technology for Verification and Analysis, \u00c9tienne Andr\u00e9 and Jun Sun (Eds.)","author":"S\u00f8lvsten Steffan Christ","key":"e_1_3_2_1_62_1","unstructured":"Steffan Christ S\u00f8lvsten and Jaco van de Pol. 2023. Predicting Memory Demands of BDD Operations Using Maximum Graph Cuts. In Automated Technology for Verification and Analysis, \u00c9tienne Andr\u00e9 and Jun Sun (Eds.). Springer Nature Switzerland, Cham, 72--92."},{"key":"e_1_3_2_1_63_1","volume-title":"APRICODD: Approximate Policy Construction Using Decision Diagrams","author":"St-Aubin Robert","year":"2000","unstructured":"Robert St-Aubin, Jesse Hoey, and Craig Boutilier. 2000. APRICODD: Approximate Policy Construction Using Decision Diagrams. In NIPS. MIT Press, 1089--1095."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-0349-4_5"},{"volume-title":"Formal Methods in Computer Aided Design","author":"Torfah Hazem","key":"e_1_3_2_1_65_1","unstructured":"Hazem Torfah, Shetal Shah, Supratik Chakraborty, S Akshay, and Sanjit A Seshia. 2021. Synthesizing pareto-optimal interpretations for black-box models. In Formal Methods in Computer Aided Design. IEEE."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10601-020-09312-3"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011624"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/606"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.08.001"},{"volume-title":"Software complexity: measures and methods","author":"Zuse Horst","key":"e_1_3_2_1_70_1","unstructured":"Horst Zuse. 2019. Software complexity: measures and methods. Vol. 4. Walter de Gruyter GmbH & Co KG."}],"event":{"name":"HSCC '25: Computation and Control","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Irvine CA USA","acronym":"HSCC '25"},"container-title":["Proceedings of the 28th ACM International Conference on Hybrid Systems: Computation and Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716863.3718049","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3716863.3718049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:47:37Z","timestamp":1756993657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716863.3718049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":70,"alternative-id":["10.1145\/3716863.3718049","10.1145\/3716863"],"URL":"https:\/\/doi.org\/10.1145\/3716863.3718049","relation":{},"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"2025-05-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}