{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:09:07Z","timestamp":1763381347055,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1942219","CNS-2106751","CNS-2107147","CNS2214272"],"award-info":[{"award-number":["CNS-1942219","CNS-2106751","CNS-2107147","CNS2214272"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016682","name":"VMware","doi-asserted-by":"publisher","award":["Early Career Faculty Grant"],"award-info":[{"award-number":["Early Career Faculty Grant"]}],"id":[{"id":"10.13039\/100016682","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,17]]},"DOI":"10.1145\/3772356.3772404","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:02:48Z","timestamp":1763380968000},"page":"69-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Case for Learned Cloud Emulators"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2722-6996","authenticated-orcid":false,"given":"Archit","family":"Bhatnagar","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9328-3205","authenticated-orcid":false,"given":"Yiming","family":"Qiu","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8384-8813","authenticated-orcid":false,"given":"Sarah","family":"McClure","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0524-9425","authenticated-orcid":false,"given":"Sylvia","family":"Ratnasamy","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8326-8124","authenticated-orcid":false,"given":"Ang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon elastic compute cloud - api reference. https:\/\/docs.aws.amazon.com\/pdfs\/AWSEC2\/latest\/APIReference\/ec2-api.pdf. [Accessed 09-07-2025]."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Web Services \u2014 aboutamazon.com. https:\/\/www.aboutamazon.com\/what-we-do\/amazon-web-services. [Accessed 29-06-2025]."},{"key":"e_1_3_2_1_3_1","unstructured":"API Design Guide | Google Cloud \u2014 cloud.google.com. https:\/\/cloud.google.com\/apis\/design. [Accessed 09-07-2025]."},{"key":"e_1_3_2_1_4_1","unstructured":"AWS CloudFormation. https:\/\/aws.amazon.com\/cloudformation\/."},{"key":"e_1_3_2_1_5_1","unstructured":"cloudcontrolapi \u2014 aws.amazon.com. https:\/\/aws.amazon.com\/cloudcontrolapi\/. [Accessed 05-07-2025]."},{"key":"e_1_3_2_1_6_1","unstructured":"LocalStack for AWS \u2014localstack.cloud. https:\/\/www.localstack.doud\/localstack-for-aws. [Accessed 29-06-2025]."},{"key":"e_1_3_2_1_7_1","unstructured":"localstack\/localstack \u2014 github.com. https:\/\/github.com\/localstack\/localstack\/issues. [Accessed 05-07-2025]."},{"key":"e_1_3_2_1_8_1","volume-title":"Mock AWS Services &x2014","author":"Moto","year":"2025","unstructured":"Moto: Mock AWS Services &x2014; Moto 5.1.7.dev documentation \u2014 docs.getmoto.org. https:\/\/docs.getmoto.org\/en\/latest\/. [Accessed 02-07-2025]."},{"key":"e_1_3_2_1_9_1","unstructured":"Pulumi: Infrastructure as code in any programming language. https:\/\/www.pulumi.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Terraform by Hashicorp. https:\/\/www.terraform.io\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Use Azurite emulator for local Azure Storage development \u2014 learn.microsoft.com. https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/common\/storage-use-azurite?tabs=visual-studio%2Cblob-storage. [Accessed 02-07-2025]."},{"key":"e_1_3_2_1_12_1","unstructured":"What is Terraform | Terraform | HashiCorp Developer \u2014 developer.hashicorp.com. https:\/\/developer.hashicorp.com\/terraform\/intro. [Accessed 05-07-2025]."},{"key":"e_1_3_2_1_13_1","unstructured":"What's New at AWS - Cloud Innovation & News \u2014 aws.amazon.com. https:\/\/aws.amazon.com\/new\/. [Accessed 05-07-2025]."},{"key":"e_1_3_2_1_14_1","volume-title":"aws, google, etc) without going broke? https:\/\/devops.stackexchange.com\/questions\/1002\/how-can-i-experiment-with-cloud-azure-aws-google-etc-without-going-broke?noredirect=1&lq=1","author":"How","year":"2021","unstructured":"How can i experiment with cloud (azure, aws, google, etc) without going broke? https:\/\/devops.stackexchange.com\/questions\/1002\/how-can-i-experiment-with-cloud-azure-aws-google-etc-without-going-broke?noredirect=1&lq=1, 2021. [Accessed 09-07-2025]."},{"key":"e_1_3_2_1_15_1","first-page":"4462","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Ishtiaq A. Al","year":"2024","unstructured":"A. Al Ishtiaq, S. S. S. Das, S. M. M. Rashid, A. Ranjbar, K. Tu, T. Wu, Z. Song, W. Wang, M. Akon, R. Zhang, et al. Hermes: unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications. In 33rd USENIX Security Symposium (USENIX Security 24), pages 4445\u20134462, 2024."},{"key":"e_1_3_2_1_16_1","first-page":"758","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"Atlidakis V.","unstructured":"V. Atlidakis, P. Godefroid, and M. Polishchuk. Restler: Stateful rest api fuzzing. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pages 748\u2013758. IEEE, 2019."},{"key":"e_1_3_2_1_17_1","first-page":"397","volume-title":"2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST)","author":"Atlidakis V.","unstructured":"V. Atlidakis, P. Godefroid, and M. Polishchuk. Checking security properties of cloud service rest apis. In 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST), pages 387\u2013397. IEEE, 2020."},{"key":"e_1_3_2_1_18_1","first-page":"62","volume-title":"Proceedings of the 9th ACM symposium on Information, computer and communications security","author":"Bossert G.","year":"2014","unstructured":"G. Bossert, F. Guih\u00e9ry, and G. Hiet. Towards automated protocol reverse engineering using semantic information. In Proceedings of the 9th ACM symposium on Information, computer and communications security, pages 51\u201362, 2014."},{"key":"e_1_3_2_1_19_1","first-page":"224","volume-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"Cadar C.","year":"2008","unstructured":"C. Cadar, D. Dunbar, and D. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. volume 8, pages 209\u2013224, 01 2008."},{"key":"e_1_3_2_1_20_1","volume-title":"The sky above the clouds","author":"Chasins S.","year":"2022","unstructured":"S. Chasins, A. Cheung, N. Crooks, A. Ghodsi, K. Goldberg, J. E. Gonzalez, J. M. Hellerstein, M. I. Jordan, A. D. Joseph, M. W. Mahoney, A. Parameswaran, D. Patterson, R. A. Popa, K. Sen, S. Shenker, D. Song, and I. Stoica. The sky above the clouds, 2022."},{"key":"e_1_3_2_1_21_1","first-page":"396","volume-title":"International Conference on Computer Aided Verification","author":"Cosler M.","unstructured":"M. Cosler, C. Hahn, D. Mendoza, F. Schmitt, and C. Trippel. nl2spec: Interactively translating unstructured natural language to temporal logics with large language models. In International Conference on Computer Aided Verification, pages 383\u2013396. Springer, 2023."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the ACM on Software Engineering, 1(FSE):1889\u20131912","author":"Endres M.","year":"2024","unstructured":"M. Endres, S. Fakhoury, S. Chakraborty, and S. K. Lahiri. Can large language models transform natural language intent into formal method postconditions? Proceedings of the ACM on Software Engineering, 1(FSE):1889\u20131912, 2024."},{"key":"e_1_3_2_1_23_1","volume-title":"NDSS","author":"Fiterau-Brostean P.","year":"2023","unstructured":"P. Fiterau-Brostean, B. Jonsson, K. Sagonas, and F. T\u00e5quist. Automata-based automated detection of state machine bugs in protocol implementations. In NDSS, 2023."},{"key":"e_1_3_2_1_24_1","first-page":"1870","volume-title":"Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"Fiter\u0103u-Bro\u015ftean P.","year":"2024","unstructured":"P. Fiter\u0103u-Bro\u015ftean, B. Jonsson, K. Sagonas, and F. T\u00e5quist. Smbugfinder: An automated framework for testing protocol implementations for state machine bugs. In Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pages 1866\u20131870, 2024."},{"key":"e_1_3_2_1_25_1","volume-title":"Constrained decoding for secure code generation","author":"Fu Y.","year":"2024","unstructured":"Y. Fu, E. Baker, Y. Ding, and Y. Chen. Constrained decoding for secure code generation, 2024."},{"key":"e_1_3_2_1_26_1","first-page":"736","volume-title":"Proceedings of the 28th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering","author":"Godefroid P.","year":"2020","unstructured":"P. Godefroid, B.-Y. Huang, and M. Polishchuk. Intelligent rest api data fuzzing. In Proceedings of the 28th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pages 725\u2013736, 2020."},{"key":"e_1_3_2_1_27_1","first-page":"323","volume-title":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"Godefroid P.","year":"2020","unstructured":"P. Godefroid, D. Lehmann, and M. Polishchuk. Differential regression testing for rest apis. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pages 312\u2013323, 2020."},{"key":"e_1_3_2_1_28_1","first-page":"59","volume-title":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Godefroid P.","unstructured":"P. Godefroid, H. Peleg, and R. Singh. Learn&fuzz: Machine learning for input fuzzing. In 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pages 50\u201359. IEEE, 2017."},{"key":"e_1_3_2_1_29_1","first-page":"1231","volume-title":"Proceedings of the 44th International Conference on Software Engineering","author":"Jain N.","year":"2022","unstructured":"N. Jain, S. Vaidyanath, A. Iyer, N. Natarajan, S. Parthasarathy, S. Rajamani, and R. Sharma. Jigsaw: Large language models meet program synthesis. In Proceedings of the 44th International Conference on Software Engineering, pages 1219\u20131231, 2022."},{"key":"e_1_3_2_1_30_1","first-page":"301","volume-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"Kim M.","year":"2022","unstructured":"M. Kim, Q. Xin, S. Sinha, and A. Orso. Automated test generation for rest apis: No time to rest yet. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pages 289\u2013301, 2022."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_32_1","first-page":"31","volume-title":"2021 28th Asia-Pacific Software Engineering Conference Workshops (APSEC Workshops)","author":"Leong I. T.","unstructured":"I. T. Leong and R. Barbosa. Generation of oracles using natural language processing. In 2021 28th Asia-Pacific Software Engineering Conference Workshops (APSEC Workshops), pages 25\u201331. IEEE, 2021."},{"key":"e_1_3_2_1_33_1","volume-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks. Advances in neural information processing systems, 33:9459\u20139474","author":"Lewis P.","year":"2020","unstructured":"P. Lewis, E. Perez, A. Piktus, F. Petroni, V. Karpukhin, N. Goyal, H. K\u00fcttler, M. Lewis, W.-t. Yih, T. Rockt\u00e4schel, et al. Retrieval-augmented generation for knowledge-intensive nlp tasks. Advances in neural information processing systems, 33:9459\u20139474, 2020."},{"key":"e_1_3_2_1_34_1","first-page":"12","volume-title":"2025 IEEE\/ACM 33rd International Conference on Program Comprehension (ICPC)","author":"Li H.","unstructured":"H. Li, Z. Dong, S. Wang, H. Zhang, L. Shen, X. Peng, and D. She. Extracting formal specifications from documents using llms for test automation. In 2025 IEEE\/ACM 33rd International Conference on Program Comprehension (ICPC), pages 1\u201312. IEEE Computer Society, 2025."},{"key":"e_1_3_2_1_35_1","first-page":"59","volume-title":"Proceedings of the ACM SIGPLAN Symposium on Very High Level Languages","author":"Liskov B.","year":"1974","unstructured":"B. Liskov and S. Zilles. Programming with abstract data types. In Proceedings of the ACM SIGPLAN Symposium on Very High Level Languages, page 50\u201359, New York, NY, USA, 1974. Association for Computing Machinery."},{"key":"e_1_3_2_1_36_1","volume-title":"Workshop on Language and Robotics at CoRL 2022","author":"Liu J. X.","year":"2022","unstructured":"J. X. Liu, Z. Yang, B. Schornstein, S. Liang, I. Idrees, S. Tellex, and A. Shah. Lang2ltl: Translating natural language commands to temporal specification with large language models. In Workshop on Language and Robotics at CoRL 2022, 2022."},{"key":"e_1_3_2_1_37_1","first-page":"502","volume-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Liu M.","year":"2021","unstructured":"M. Liu, X. Peng, A. Marcus, C. Treude, X. Bai, G. Lyu, J. Xie, and X. Zhang. Learning-based extraction of first-order logic representations of api directives. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pages 491\u2013502, 2021."},{"key":"e_1_3_2_1_38_1","first-page":"18","volume-title":"Proc. NDSS","author":"Luo Z.","year":"2024","unstructured":"Z. Luo, K. Liang, Y. Zhao, F. Wu, J. Yu, H. Shi, and Y. Jiang. Dynpre: Protocol reverse engineering via dynamic inference. In Proc. NDSS, pages 1\u201318, 2024."},{"key":"e_1_3_2_1_39_1","volume-title":"Specgen: Automated generation of formal program specifications via large language models. arXiv preprint arXiv:2401.08807","author":"Ma L.","year":"2024","unstructured":"L. Ma, S. Liu, Y. Li, X. Xie, and L. Bu. Specgen: Automated generation of formal program specifications via large language models. arXiv preprint arXiv:2401.08807, 2024."},{"key":"e_1_3_2_1_40_1","volume-title":"Large language models based automatic synthesis of software specifications. arXiv preprint arXiv:2304.09181","author":"Mandal S.","year":"2023","unstructured":"S. Mandal, A. Chethan, V. Janfaza, S. Mahmud, T. A. Anderson, J. Turek, J. J. Tithi, and A. Muzahid. Large language models based automatic synthesis of software specifications. arXiv preprint arXiv:2304.09181, 2023."},{"key":"e_1_3_2_1_41_1","first-page":"614","volume-title":"2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE)","author":"Mazhar A.","unstructured":"A. Mazhar, S. S. Alam, W. X. Zheng, Y. Chen, S. Nath, and T. Xu. Fidelity of cloud emulators: The imitation game of testing cloud-based software. In 2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE), pages 614\u2013614. IEEE Computer Society, 2025."},{"key":"e_1_3_2_1_42_1","first-page":"199","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"Motwani M.","year":"2019","unstructured":"M. Motwani and Y. Brun. Automatically generating precise oracles from structured natural language specifications. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pages 188\u2013199, 2019."},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. ACM Program. Lang., 9(PLDI)","author":"M\u00fcndler N.","year":"2025","unstructured":"N. M\u00fcndler, J. He, H. Wang, K. Sen, D. Song, and M. Vechev. Type-constrained code generation with language models. Proc. ACM Program. Lang., 9(PLDI), June 2025."},{"key":"e_1_3_2_1_44_1","first-page":"177","volume-title":"Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering","author":"Nguyen H. A.","year":"2014","unstructured":"H. A. Nguyen, R. Dyer, T. N. Nguyen, and H. Rajan. Mining preconditions of apis in large-scale code corpus. In Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, pages 166\u2013177, 2014."},{"key":"e_1_3_2_1_45_1","first-page":"68","volume-title":"2022 IEEE Symposium on Security and Privacy (SP)","author":"Pacheco M. L.","unstructured":"M. L. Pacheco, M. von Hippel, B. Weintraub, D. Goldwasser, and C. Nita-Rotaru. Automated attack synthesis by extracting finite state machines from protocol specification documents. In 2022 IEEE Symposium on Security and Privacy (SP), pages 51\u201368. IEEE, 2022."},{"key":"e_1_3_2_1_46_1","first-page":"10","volume-title":"Proceedings of the 19th International Conference on Availability, Reliability and Security","author":"Van A. Tran","year":"2024","unstructured":"A. Tran Van, O. Levillain, and H. Debar. Mealy verifier: An automated, exhaustive, and explainable methodology for analyzing state machines in protocol implementations. In Proceedings of the 19th International Conference on Availability, Reliability and Security, pages 1\u201310, 2024."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967606"},{"key":"e_1_3_2_1_48_1","first-page":"437","volume-title":"Proceedings of the 44th International Conference on Software Engineering","author":"Wu H.","year":"2022","unstructured":"H. Wu, L. Xu, X. Niu, and C. Nie. Combinatorial testing of restful apis. In Proceedings of the 44th International Conference on Software Engineering, pages 426\u2013437, 2022."},{"key":"e_1_3_2_1_49_1","volume-title":"Cloud infrastructure management in the age of ai agents. arXiv preprint arXiv:2506.12270","author":"Yang Z.","year":"2025","unstructured":"Z. Yang, A. Bhatnagar, Y. Qiu, T. Miao, P. T. J. Kon, Y. Xiao, Y. Huang, M. Casado, and A. Chen. Cloud infrastructure management in the age of ai agents. arXiv preprint arXiv:2506.12270, 2025."},{"key":"e_1_3_2_1_50_1","first-page":"455","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Yang Z.","year":"2023","unstructured":"Z. Yang, Z. Wu, M. Luo, W.-L. Chiang, R. Bhardwaj, W. Kwon, S. Zhuang, F. S. Luan, G. Mittal, S. Shenker, and I. Stoica. SkyPilot: An intercloud broker for sky computing. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23), pages 437\u2013455, Boston, MA, Apr. 2023. USENIX Association."},{"key":"e_1_3_2_1_51_1","volume-title":"NDSS","author":"Ye Y.","year":"2021","unstructured":"Y. Ye, Z. Zhang, F. Wang, X. Zhang, and D. Xu. Netplier: Probabilistic network protocol reverse engineering from message traces. In NDSS, 2021."},{"key":"e_1_3_2_1_52_1","first-page":"37","volume-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2020","author":"Zhai J.","year":"2020","unstructured":"J. Zhai, Y. Shi, M. Pan, G. Zhou, Y. Liu, C. Fang, S. Ma, L. Tan, and X. Zhang. C2s: translating natural language comments to formal program specifications. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2020, page 25\u201337, New York, NY, USA, 2020. Association for Computing Machinery."},{"key":"e_1_3_2_1_53_1","article-title":"Restless: Enhancing state-of-the-art rest api fuzzing with llms in cloud service computing","author":"Zheng T.","year":"2024","unstructured":"T. Zheng, J. Shao, J. Dai, S. Jiang, X. Chen, and C. Shen. Restless: Enhancing state-of-the-art rest api fuzzing with llms in cloud service computing. IEEE Transactions on Services Computing, 2024.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_1_54_1","first-page":"318","volume-title":"2009 IEEE\/ACM International Conference on Automated Software Engineering","author":"Zhong H.","year":"2009","unstructured":"H. Zhong, L. Zhang, T. Xie, and H. Mei. Inferring resource specifications from natural language api documentation. In 2009 IEEE\/ACM International Conference on Automated Software Engineering, pages 307\u2013318, 2009."}],"event":{"name":"HotNets '25: 24th ACM Workshop on Hot Topics in Networks","location":"UMD Campus College Park MD USA","acronym":"HotNets '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 24th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772356.3772404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:07:19Z","timestamp":1763381239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772356.3772404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,17]]},"references-count":54,"alternative-id":["10.1145\/3772356.3772404","10.1145\/3772356"],"URL":"https:\/\/doi.org\/10.1145\/3772356.3772404","relation":{},"subject":[],"published":{"date-parts":[[2025,11,17]]},"assertion":[{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}