{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:43:42Z","timestamp":1777106622257,"version":"3.51.4"},"reference-count":142,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T00:00:00Z","timestamp":1454889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Italian Ministry of Education"},{"name":"University and Research"},{"name":"CECRIS FP7 project","award":["324334"],"award-info":[{"award-number":["324334"]}]},{"name":"COSMIC public-private laboratory","award":["PON02 00669"],"award-info":[{"award-number":["PON02 00669"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2016,2,8]]},"abstract":"<jats:p>With the rise of software complexity, software-related accidents represent a significant threat for computer-based systems. Software Fault Injection is a method to anticipate worst-case scenarios caused by faulty software through the deliberate injection of software faults. This survey provides a comprehensive overview of the state of the art on Software Fault Injection to support researchers and practitioners in the selection of the approach that best fits their dependability assessment goals, and it discusses how these approaches have evolved to achieve fault representativeness, efficiency, and usability. The survey includes a description of relevant applications of Software Fault Injection in the context of fault-tolerant systems.<\/jats:p>","DOI":"10.1145\/2841425","type":"journal-article","created":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T22:37:07Z","timestamp":1454971027000},"page":"1-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":161,"title":["Assessing Dependability with Software Fault Injection"],"prefix":"10.1145","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1084-4824","authenticated-orcid":false,"given":"Roberto","family":"Natella","sequence":"first","affiliation":[{"name":"DIETI, Federico II University of Naples, Naples, Italy"}]},{"given":"Domenico","family":"Cotroneo","sequence":"additional","affiliation":[{"name":"DIETI, Federico II University of Naples, Naples, Italy"}]},{"given":"Henrique S.","family":"Madeira","sequence":"additional","affiliation":[{"name":"CISUC, University of Coimbra, Coimbra, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2016,2,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 83--88","author":"Aidemark J."},{"key":"e_1_2_1_2_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 867--876","author":"Albinet A."},{"key":"e_1_2_1_3_1","unstructured":"AMBER project. 2009. AMBER Final Research Roadmap. Retrieved from http:\/\/www.amber-project.eu\/.  AMBER project. 2009. AMBER Final Research Roadmap. Retrieved from http:\/\/www.amber-project.eu\/."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.44380"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1228509"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.980005"},{"key":"e_1_2_1_8_1","volume-title":"Proc. Latin-American Symposium on Dependable Computing. 100--105","author":"Arlat J."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.537015"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168865"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11408901_19"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.54853"},{"key":"e_1_2_1_14_1","volume-title":"Workshop de Testes e Toler\u00e2ncia a Falhas.","author":"Basso T."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.40"},{"key":"e_1_2_1_16_1","volume-title":"Proc. Intl. Conf. on Software Engineering. 122--131","author":"Bounimova E."},{"key":"e_1_2_1_17_1","volume-title":"Workshop on Self-Healing, Adaptive and self-MANaged Systems.","author":"Broadwell P."},{"key":"e_1_2_1_18_1","volume-title":"Proc. Symp. on Operating Systems Design and Implementation.","author":"Candea G."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/6.780999"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.666826"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.14"},{"key":"e_1_2_1_22_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 240--249","author":"Chandra S."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.177364"},{"key":"e_1_2_1_24_1","volume-title":"Proc. Intl. Conf. on Software Engineering. 246--255","author":"Chillarege R."},{"key":"e_1_2_1_25_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 304--313","author":"Christmansson J."},{"key":"e_1_2_1_26_1","volume-title":"Proc. IEEE Intl. Symp. on Software Reliability Engineering. 369--378","author":"Christmansson J."},{"key":"e_1_2_1_27_1","volume-title":"Proc. IEEE Intl. Symp. on Software Reliability Engineering. 175--184","author":"Christmansson J."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.386985"},{"key":"e_1_2_1_29_1","volume-title":"Proc. IEEE\/ACM Intl. Conf. on Automated Software Engineering. 125--135","author":"Cotroneo D."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2012.12"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03850-6_9"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/226295.226313"},{"key":"e_1_2_1_33_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 404--414","author":"Dawson S."},{"key":"e_1_2_1_34_1","unstructured":"DBench project. 2004. DBench Final Report. Retrieved from http:\/\/www.laas.fr\/DBench\/.  DBench project. 2004. DBench Final Report. Retrieved from http:\/\/www.laas.fr\/DBench\/."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348246.1348249"},{"key":"e_1_2_1_36_1","volume-title":"Proc. Conf. Performability in Computer Systems. 79--95","author":"Delamaro M. E."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_2_1_38_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 522--527","author":"Dingman C. P."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.92"},{"key":"e_1_2_1_40_1","volume-title":"Proc. IEEE Intl. Symp. on Software Reliability Engineering. 329--340","author":"Duraes J."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.113"},{"key":"e_1_2_1_42_1","first-page":"2563","article-title":"Multidimensional characterization of the impact of faulty drivers on the operating systems behavior","volume":"86","author":"Dur\u00e3es J.","year":"2003","journal-title":"IEICE Trans. Inf. Sys."},{"key":"e_1_2_1_43_1","volume-title":"Proc. Intl. Conf. on Computer Safety, Reliability, and Security. 297--310","author":"Dur\u00e3es J."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.35"},{"key":"e_1_2_1_46_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 155--164","author":"Fetzer C."},{"key":"e_1_2_1_47_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 257--266","author":"Fonseca J."},{"key":"e_1_2_1_48_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 93--102","author":"Fonseca J."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0005"},{"key":"e_1_2_1_50_1","volume-title":"Proc. IEEE Intl. Symp. on Software Reliability Engineering. 231--235","author":"Ghosh A. K."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2013.12"},{"key":"e_1_2_1_52_1","volume-title":"Proc. Network and Distributed Sys. Sec. Symp. 151--166","author":"Godefroid P."},{"key":"e_1_2_1_53_1","first-page":"93","article-title":"Achieving cost-effective software reliability through self-healing","volume":"29","author":"Gorla A.","year":"2012","journal-title":"Comput. Inf."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.58719"},{"key":"e_1_2_1_55_1","volume-title":"Proc. USENIX Symposium on Networked Systems Design and Implementation.","author":"Gunawi H. S."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231145"},{"key":"e_1_2_1_57_1","volume-title":"Proc. Intl. Computer Performance and Dependability Symp. 204--213","author":"Han S."},{"key":"e_1_2_1_58_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 161--170","author":"Hiller M."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.585157"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.229487"},{"key":"e_1_2_1_61_1","first-page":"12","article-title":"IEEE standard glossary of software engineering terminology","volume":"610","author":"IEEE.","year":"1990","journal-title":"IEEE Std"},{"key":"e_1_2_1_62_1","volume-title":"IEEE standard for information technology--Portable operating system interface (POSIX) part 1","author":"EE.","year":"1993"},{"key":"e_1_2_1_63_1","volume-title":"Product development: software level. ISO 26262: Road vehicles -- Functional safety 6","author":"SO.","year":"2011"},{"key":"e_1_2_1_64_1","volume-title":"Proc. Pacific Rim Intl. Symp. on Dependable Computing. 51--58","author":"Jarboui T."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.016"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.45"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.23"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.71"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048082"},{"key":"e_1_2_1_71_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 681--686","author":"Kalakech A."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.364536"},{"key":"e_1_2_1_73_1","doi-asserted-by":"crossref","unstructured":"K. Kanoun and L. Spainhower. 2008. Dependability Benchmarking for Computer Systems. Wiley-IEEE Computer Society.   K. Kanoun and L. Spainhower. 2008. Dependability Benchmarking for Computer Systems. Wiley-IEEE Computer Society.","DOI":"10.1002\/9780470370506"},{"key":"e_1_2_1_74_1","volume-title":"Proc. Workshop on Fault-Tolerant Parallel and Distributed Systems. 252--259","author":"Kao W.-I."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.256857"},{"key":"e_1_2_1_77_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 157--166","author":"Keller L."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210704"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.877845"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610418"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.56851"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.39"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.387474"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.11950"},{"key":"e_1_2_1_86_1","volume-title":"Proc. USENIX Annual Technical Conf.","author":"Li X."},{"key":"e_1_2_1_87_1","volume-title":"Software Fault Tolerance","author":"Lyu M. R."},{"key":"e_1_2_1_88_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 417--426","author":"Madeira H."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.44"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.2514\/6.1984-2726"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063511"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738398"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.500"},{"key":"e_1_2_1_94_1","unstructured":"Microsoft Corp. 2014. Resilience by Design for Cloud Services. Retrieved from http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id&equals;38823.  Microsoft Corp. 2014. Resilience by Design for Cloud Services. Retrieved from http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id&equals;38823."},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_2_1_96_1","volume-title":"Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services. Technical Report CSTR-95-1268.","author":"Miller B.","year":"1998"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.16"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542431.1542439"},{"key":"e_1_2_1_99_1","volume-title":"NASA software safety guidebook. NASA-GB-8719.13","author":"SA.","year":"2004"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2010.13"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.124"},{"key":"e_1_2_1_102_1","volume-title":"Proc. IEEE Intl. Symp. on Software Reliability Engineering. 185--194","author":"Ng W. T."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.919278"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/125489.125473"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"e_1_2_1_106_1","volume-title":"USENIX Symp. on Internet Technologies and Systems.","author":"Oppenheimer D."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.50"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-009-0118-1"},{"key":"e_1_2_1_110_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 472--481","author":"Pattabiraman K."},{"key":"e_1_2_1_111_1","volume-title":"Technical Report TR-02-1175.","author":"Patterson D.","year":"2002"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.364537"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.65"},{"key":"e_1_2_1_114_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 86--94","author":"Ries G. L."},{"key":"e_1_2_1_115_1","volume-title":"DO-178B software considerations in airborne systems and equipment certification. Requirements and Technical Concepts for Aviation","author":"CA.","year":"1992"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"key":"e_1_2_1_117_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 22--29","author":"Salles F."},{"key":"e_1_2_1_118_1","volume-title":"Proc. Latin American Symp. on Dependable Computing.","author":"Sanches B. P."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/128738.128742"},{"key":"e_1_2_1_120_1","unstructured":"SPEC. 2000. SPECweb99 v1.02. Retrieved from http:\/\/www.spec.org\/web99\/.  SPEC. 2000. SPECweb99 v1.02. Retrieved from http:\/\/www.spec.org\/web99\/."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.16"},{"key":"e_1_2_1_122_1","volume-title":"Proc. Intl. Computer Performance and Dependability Symp. 91--100","author":"Stott D. T."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3959.3962"},{"key":"e_1_2_1_124_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 2--9.","author":"Sullivan M."},{"key":"e_1_2_1_125_1","volume-title":"Intl. Symp. on Fault-Tolerant Computing. 390--399","author":"Suri N."},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.3"},{"key":"e_1_2_1_127_1","volume-title":"Proc. IEEE Intl. Symp. on Software Reliability Engineering. 40--50","author":"Thakur A."},{"key":"e_1_2_1_128_1","unstructured":"TPCC. 2010. TPC Benchmark C (TPC-C) v5.11. Retrieved from http:\/\/www.tpc.org\/tpcc\/.  TPCC. 2010. TPC Benchmark C (TPC-C) v5.11. Retrieved from http:\/\/www.tpc.org\/tpcc\/."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.811108"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.13"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.30"},{"key":"e_1_2_1_132_1","volume-title":"Proc. Intl. Conf. on Very Large Data Bases. 742--753","author":"Vieira M."},{"key":"e_1_2_1_133_1","volume-title":"Proc. Workshop on Hot Topics in System Dependability.","author":"Vieira M."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.683008"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.595959"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00203-1"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.714817"},{"key":"e_1_2_1_138_1","unstructured":"L. Wilson. 2013. International Technology Roadmap for Semiconductors. Retrieved from http:\/\/www.itrs.net.  L. Wilson. 2013. International Technology Roadmap for Semiconductors. Retrieved from http:\/\/www.itrs.net."},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985801"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575310"},{"key":"e_1_2_1_141_1","doi-asserted-by":"crossref","unstructured":"C. Wohlin P. Runeson M. H\u00f6st M. C. Ohlsson B. Regnell and A. Wessl\u00e9n. 2012. Experimentation in Software Engineering. Springer.   C. Wohlin P. Runeson M. H\u00f6st M. C. Ohlsson B. Regnell and A. Wessl\u00e9n. 2012. Experimentation in Software Engineering. Springer.","DOI":"10.1007\/978-3-642-29044-2"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00098-0"},{"key":"e_1_2_1_143_1","volume-title":"Proc. IEEE\/IFIP Intl. Conf. Dependable Systems and Networks. 421--430","author":"Xu J."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:48Z","timestamp":1750222428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841425"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2016,2,8]]},"references-count":142,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,2,8]]}},"alternative-id":["10.1145\/2841425"],"URL":"https:\/\/doi.org\/10.1145\/2841425","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,8]]},"assertion":[{"value":"2013-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}