{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T03:00:49Z","timestamp":1755226849785,"version":"3.43.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"abstract":"<jats:p>Changing software is essential to add needed functionality and to fix problems, but changes may introduce defects that lead to outages. This motivates one of the oldest software quality control techniques: a temporary prevention of non-critical changes to the codebase \u2014 code freeze. Despite its widespread use in practice, research literature is scant. Historically, code freezes were used as a way to improve software quality by preventing changes during periods before software releases, but code freezes significantly slow down development. To address this shortcoming we develop and evaluate a family of code un-freeze (permitting changes) strategies tailored to different occasions and products at Meta. They are designed to un-freeze the maximum amount of code without compromising quality. The three primary dimensions to un-freeze involve a) the exact timing of (and the reasoning behind it) the code freezes, b) the parts of the organization or the codebase where the codebase freeze is applied to, and c) the method of screening of the code diffs during the code freeze with the aim to allow low risk diffs and prevent only the most risky diffs.<\/jats:p>\n          <jats:p>\n            To operationalize the drivers of outages, we consider the entire network of interdependencies among different parts of the source code, the engineers that modify the code, code complexity, and the coordination dependencies and authors\u2019 expertise. Since the code freeze is a balancing act between reducing outages and allowing software development to proceed unimpeded, the performance of the various approaches to code un-freeze is evaluated based on the fraction of flagged\/gated changes to measure overhead and the fraction of all outage-causing changes contained within the set of flagged set of changes to measure the ability of the code un-freeze to delay (or prevent) outages. We found that taking into account the risk posed by modifying individual files and the properties of the change we could un-freeze two and\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(2.5\\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            times more changes correspondingly.\n          <\/jats:p>\n          <jats:p>The change level model is used by Meta in production. For example, during the winter 2023 code freeze, we see that only 16% of changes are gated. Although 42% more changes landed (were integrated into the codebase) compared to the prior year, there was a 52% decrease in outages. This reduction meant less impact on users and less strain on engineers during the holiday period. The risk model has been enormously effective at allowing low risk changes to proceed while gating high risk changes and reducing outages.<\/jats:p>","DOI":"10.1145\/3722216","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T14:51:05Z","timestamp":1741704665000},"update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Risk Models to Improve Productivity for Effective Code Un-Freeze at Scale"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7987-7598","authenticated-orcid":false,"given":"Audris","family":"Mockus","sequence":"first","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3734-3157","authenticated-orcid":false,"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1137-4297","authenticated-orcid":false,"given":"Peter C","family":"Rigby","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4067-9515","authenticated-orcid":false,"given":"David","family":"Amsallem","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4082-2934","authenticated-orcid":false,"given":"Parveen","family":"Bansal","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4103-1196","authenticated-orcid":false,"given":"Kaavya","family":"Chinniah","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4185-5960","authenticated-orcid":false,"given":"Brian","family":"Ellis","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7402-7655","authenticated-orcid":false,"given":"Peng","family":"Fan","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2519-9867","authenticated-orcid":false,"given":"Jun","family":"Ge","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1405-4838","authenticated-orcid":false,"given":"Bingjie","family":"He","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7645-1949","authenticated-orcid":false,"given":"Kelly","family":"Hirano","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3478-5350","authenticated-orcid":false,"given":"Sahil","family":"Kumar","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4187-7371","authenticated-orcid":false,"given":"Ajay","family":"Lingapuram","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1891-7764","authenticated-orcid":false,"given":"Andrew","family":"Loe","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8033-1093","authenticated-orcid":false,"given":"Megh","family":"Mehta","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4700-9882","authenticated-orcid":false,"given":"Venus","family":"Montes","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8545-6335","authenticated-orcid":false,"given":"Maher","family":"Saba","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5407-3875","authenticated-orcid":false,"given":"Gursharan","family":"Singh","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1985-8659","authenticated-orcid":false,"given":"Matt","family":"Steiner","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7627-8695","authenticated-orcid":false,"given":"Weiyan","family":"Sun","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3723-9004","authenticated-orcid":false,"given":"Siri","family":"Uppalapati","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1358-4124","authenticated-orcid":false,"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"all at Meta Platforms, Inc., USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.108"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","first-page":"3323","DOI":"10.1007\/s10664-020-09837-4","article-title":"Do code review measures explain the incidence of post-release defects","volume":"25","author":"Rigby Andrey Krutauz Peter C.","year":"2020","unstructured":"Peter C. Rigby Andrey Krutauz, Tapajit Dey and Audris Mockus. 2020. Do code review measures explain the incidence of post-release defects? International Journal of Empirical Software Engineering 25 (2020), 3323\u20133356. papers\/reviews_replication_emse.pdf","journal-title":"International Journal of Empirical Software Engineering"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1136\/jech.2004.028662"},{"key":"e_1_2_1_4_1","volume-title":"2009 20th International Symposium on Software Reliability Engineering. IEEE, 109\u2013119","author":"Bird Christian","year":"2009","unstructured":"Christian Bird, Nachiappan Nagappan, Harald Gall, Brendan Murphy, and Premkumar Devanbu. 2009. Putting it all together: Using socio-technical networks to predict failures. In 2009 20th International Symposium on Software Reliability Engineering. IEEE, 109\u2013119."},{"volume-title":"Software Engineering Economics","author":"Boehm B.W.","key":"e_1_2_1_5_1","unstructured":"B.W. Boehm. 1981. Software Engineering Economics. Prentice-Hall."},{"key":"e_1_2_1_6_1","volume-title":"Herbsleb","author":"Cataldo Marcelo","year":"2009","unstructured":"Marcelo Cataldo, Audris Mockus, Jeffrey A. Roberts, and James D. Herbsleb. 2009. Software Dependencies, the Structure of Work Dependencies and their Impact on Failures. IEEE Transactions on Software Engineering (2009). papers\/multicompany.pdf"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2616306"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1080\/01621459.1988.10478676","article-title":"When should one stop testing software","volume":"83","author":"Dalal Siddharta R","year":"1988","unstructured":"Siddharta R Dalal and Collin L Mallows. 1988. When should one stop testing software? J. Amer. Statist. Assoc. 83, 403 (1988), 872\u2013879.","journal-title":"J. Amer. Statist. Assoc."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0587.2012.07348.x"},{"key":"e_1_2_1_10_1","volume-title":"David Lo, Ahmed E Hassan, and Shanping Li.","author":"Fan Yuanrui","year":"2019","unstructured":"Yuanrui Fan, Xin Xia, Daniel Alencar Da Costa, David Lo, Ahmed E Hassan, and Shanping Li. 2019. The impact of mislabeled changes by szz on just-in-time defect prediction. IEEE transactions on software engineering 47, 8 (2019), 1559\u20131586."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"e_1_2_1_12_1","first-page":"40","article-title":"Customer Quality Improvement of Software Systems. Software","volume":"33","author":"Hackbarth R.","year":"2016","unstructured":"R. Hackbarth, A. Mockus, J. Palframan, and R. Sethi. 2016. Customer Quality Improvement of Software Systems. Software, IEEE 33, 4 (2016), 40\u201345. papers\/cqm2.pdf","journal-title":"IEEE"},{"key":"e_1_2_1_13_1","volume-title":"2003 International Conference on Foundations of Software Engineering. ACM Press","author":"Herbsleb James","year":"2003","unstructured":"James Herbsleb and Audris Mockus. 2003. Formulation and Preliminary Test of an Empirical Theory of Coordination in Software Engineering. In 2003 International Conference on Foundations of Software Engineering. ACM Press, Helsinki, Finland. http:\/\/dl.acm.org\/authorize?787510"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00113.x"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609530"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289026"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 19th International Conference on Mining Software Repositories. 191\u2013195","author":"Keshavarz Hossein","year":"2022","unstructured":"Hossein Keshavarz and Meiyappan Nagappan. 2022. Apachejit: a large dataset for just-in-time defect prediction. In Proceedings of the 19th International Conference on Mining Software Repositories. 191\u2013195."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999432"},{"key":"e_1_2_1_20_1","volume-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP). IEEE, 23\u201332","author":"Laukkanen Eero","year":"2017","unstructured":"Eero Laukkanen, Maria Paasivaara, Juha Itkonen, Casper Lassenius, and Teemu Arvonen. 2017. Towards continuous delivery by reducing the feature freeze period: a case study. In 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP). IEEE, 23\u201332."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(97)00029-3"},{"volume-title":"Empirical Software Engineering Issues: Critical Assessments and Future Directions, V Basili and et al (Eds.).","author":"Mockus Audris","key":"e_1_2_1_22_1","unstructured":"Audris Mockus. 2007. Software Support Tools and Experimental Work. In Empirical Software Engineering Issues: Critical Assessments and Future Directions, V Basili and et al (Eds.). Vol. LNCS 4336. Springer, 91\u201399. papers\/SSTaEW.pdf"},{"volume-title":"Guide to Advanced Empirical Software Engineering","author":"Mockus Audris","key":"e_1_2_1_23_1","unstructured":"Audris Mockus. 2008. Missing data in software engineering. In Guide to Advanced Empirical Software Engineering, J. Singer et al. (Ed.). Springer-Verlag, 185\u2013200. papers\/missing.pdf"},{"volume-title":"ACM SIGSOFT \/ FSE.","author":"Mockus Audris","key":"e_1_2_1_24_1","unstructured":"Audris Mockus. 2010. Organizational Volatility and its Effects on Software Defects. In ACM SIGSOFT \/ FSE. Santa Fe, New Mexico, 117\u2013126. http:\/\/dl.acm.org\/authorize?309271"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Audris Mockus. 2014. Engineering Big Data Solutions. In ICSE\u201914 FOSE. https:\/\/dl.acm.org\/authorize?N14216","DOI":"10.1145\/2593882.2593889"},{"key":"e_1_2_1_26_1","unstructured":"Audris Mockus. 2019. Insights from Open Source Supply Chains. https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3342813?cid=81100250207 FSE\u201919 Industry Keynote."},{"key":"e_1_2_1_27_1","unstructured":"Audris Mockus. 2023. Securing Large Language Model Software Supply Chains. papers\/wocllm.pdf ASE\u201923 LLMs in Software Engineering."},{"key":"e_1_2_1_28_1","volume-title":"9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. http:\/\/dl.acm.org\/authorize?6845890","author":"Mockus Audris","year":"2013","unstructured":"Audris Mockus, Randy Hackbarth, and John Palframan. 2013. Risky Files: An Approach to Focus Quality Improvement Effort. In 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. http:\/\/dl.acm.org\/authorize?6845890"},{"key":"e_1_2_1_29_1","first-page":"2","article-title":"Predicting Risk of Software Changes","volume":"5","author":"Mockus Audris","year":"2000","unstructured":"Audris Mockus and David M. Weiss. 2000. Predicting Risk of Software Changes. Bell Labs Technical Journal 5, 2 (April\u2013June 2000), 169\u2013180. papers\/bltj13.pdf","journal-title":"Bell Labs Technical Journal"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/22980"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330225"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 22nd international conference on Software engineering. 577\u2013586","author":"Nishiyama Tetsuto","year":"2000","unstructured":"Tetsuto Nishiyama, Kunihiko Ikeda, and Toru Niwa. 2000. Technology transfer macro-process: A practical guide for the effective introduction of technology. In Proceedings of the 22nd international conference on Software engineering. 577\u2013586."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.104773"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00031-X"},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10664-021-09970-8","article-title":"An empirical study on the use of SZZ for identifying inducing changes of non-functional bugs","volume":"26","author":"Quach Sophia","year":"2021","unstructured":"Sophia Quach, Maxime Lamothe, Yasutaka Kamei, and Weiyi Shang. 2021. An empirical study on the use of SZZ for identifying inducing changes of non-functional bugs. Empirical Software Engineering 26, 4 (2021), 71.","journal-title":"Empirical Software Engineering"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901745"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.31"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12130-999-1026-0"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the 12th ACM\/IEEE international symposium on empirical software engineering and measurement. 1\u20134.","author":"Rodr\u00edguez-P\u00e9rez Gema","year":"2018","unstructured":"Gema Rodr\u00edguez-P\u00e9rez, Andy Zaidman, Alexander Serebrenik, Gregorio Robles, and Jes\u00fas M Gonz\u00e1lez-Barahona. 2018. What if a bug has a different origin? making sense of bugs without an explicit bug introducing change. In Proceedings of the 12th ACM\/IEEE international symposium on empirical software engineering and measurement. 1\u20134."},{"key":"e_1_2_1_41_1","volume-title":"Rapid release at massive scale. Web site: https:\/\/engineering.fb.com\/web\/rapid-release-at-massive-scale","author":"Rossi Chuck","year":"2017","unstructured":"Chuck Rossi. 2017. Rapid release at massive scale. Web site: https:\/\/engineering.fb.com\/web\/rapid-release-at-massive-scale (2017)."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372305"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1824760.1824763"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372269"},{"key":"e_1_2_1_45_1","volume-title":"Ove Hansen, Vigdis By Kampenes, Amela Karahasanovic, N-K Liborg, and Anette C Rekdal.","author":"Sj\u00f8berg Dag IK","year":"2005","unstructured":"Dag IK Sj\u00f8berg, Jo Erskine Hannay, Ove Hansen, Vigdis By Kampenes, Amela Karahasanovic, N-K Liborg, and Anette C Rekdal. 2005. A survey of controlled experiments in software engineering. IEEE transactions on software engineering 31, 9 (2005), 733\u2013753."},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/S0272-6963(00)00045-0","article-title":"A typology of project-level technology transfer processes","volume":"18","author":"Stock Gregory N","year":"2000","unstructured":"Gregory N Stock and Mohan V Tatikonda. 2000. A typology of project-level technology transfer processes. Journal of Operations Management 18, 6 (2000), 719\u2013737.","journal-title":"Journal of Operations Management"},{"volume-title":"Action research","author":"Stringer Ernest T","key":"e_1_2_1_47_1","unstructured":"Ernest T Stringer and Alfredo Ortiz Arag\u00f3n. 2020. Action research. Sage publications."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953355.1953381"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876537"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/328204.328208"},{"key":"e_1_2_1_51_1","volume-title":"2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 534\u2013545","author":"Wang Song","year":"2021","unstructured":"Song Wang and Nachiappan Nagappan. 2021. Characterizing and understanding software developer networks in security development. In 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 534\u2013545."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390817.1390826"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606653"},{"key":"e_1_2_1_54_1","volume-title":"NASA Goddard Software Engineering Workshop. Citeseer, 52","author":"Zelkowitz Marvin V","year":"1998","unstructured":"Marvin V Zelkowitz, Dolores R Wallace, and D Binkley. 1998. Culture conflicts in software engineering technology transfer. In NASA Goddard Software Engineering Workshop. Citeseer, 52."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567550"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3722216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T14:51:19Z","timestamp":1741704679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,11]]},"references-count":56,"alternative-id":["10.1145\/3722216"],"URL":"https:\/\/doi.org\/10.1145\/3722216","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"type":"print","value":"1049-331X"},{"type":"electronic","value":"1557-7392"}],"subject":[],"published":{"date-parts":[[2025,3,11]]},"assertion":[{"value":"2024-04-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3722216"}}