iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3192366.3192400
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:28:00Z","timestamp":1730320080960,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,11]]},"DOI":"10.1145\/3192366.3192400","type":"proceedings-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:16:01Z","timestamp":1528805761000},"page":"586-602","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Bayonet: probabilistic inference for networks"],"prefix":"10.1145","author":[{"given":"Timon","family":"Gehr","sequence":"first","affiliation":[{"name":"ETH Zurich, Switzerland"}]},{"given":"Sasa","family":"Misailovic","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Petar","family":"Tsankov","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]},{"given":"Laurent","family":"Vanbever","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]},{"given":"Pascal","family":"Wiesmann","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133904"},{"volume-title":"Foundations of Software Science and Computation Structures, Bart Jacobs and Christof L\u00f6ding (Eds.)","author":"Amtoft Torben","key":"e_1_3_2_2_2_1","unstructured":"Torben Amtoft and Anindya Banerjee . 2016. A Theory of Slicing for Probabilistic Control Flow Graphs . In Foundations of Software Science and Computation Structures, Bart Jacobs and Christof L\u00f6ding (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 180\u2013196. Torben Amtoft and Anindya Banerjee. 2016. A Theory of Slicing for Probabilistic Control Flow Graphs. In Foundations of Software Science and Computation Structures, Bart Jacobs and Christof L\u00f6ding (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 180\u2013196."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492061"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103721"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_35"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837653"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541958"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228312"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764876"},{"volume-title":"DataDriven Synthesis of Full Probabilistic Programs","author":"Chasins Sarah","key":"e_1_3_2_2_12_1","unstructured":"Sarah Chasins and Phitchaya Mangpo Phothilimthana . 2017. DataDriven Synthesis of Full Probabilistic Programs . In Computer Aided Verification, Rupak Majumdar and Viktor Kun\u010dak (Eds.). Springer International Publishing , Cham , 279\u2013304. Sarah Chasins and Phitchaya Mangpo Phothilimthana. 2017. DataDriven Synthesis of Full Probabilistic Programs. In Computer Aided Verification, Rupak Majumdar and Viktor Kun\u010dak (Eds.). Springer International Publishing, Cham, 279\u2013304."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3954"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491423"},{"volume-title":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. 1\u20135.","author":"Dainotti A.","key":"e_1_3_2_2_15_1","unstructured":"A. Dainotti , W. de Donato , A. Pescape , and P. Salvo Rossi . 2008. Classification of Network Traffic via Packet-Level Hidden Markov Models . In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. 1\u20135. A. Dainotti, W. de Donato, A. Pescape, and P. Salvo Rossi. 2008. Classification of Network Traffic via Packet-Level Hidden Markov Models. In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. 1\u20135."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-014-0361-y"},{"volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"de Moura Leonardo","key":"e_1_3_2_2_17_1","unstructured":"Leonardo de Moura and Nikolaj Bj\u00f8rner . 2008. Z3: An Efficient SMT Solver . In Tools and Algorithms for the Construction and Analysis of Systems , C. R. Ramakrishnan and Jakob Rehof (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 337\u2013340. Leonardo de Moura and Nikolaj Bj\u00f8rner. 2008. Z3: An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems, C. R. Ramakrishnan and Jakob Rehof (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 337\u2013340."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.060112.120353"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908124"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486870"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789803"},{"volume-title":"Probabilistic NetKAT","author":"Foster Nate","key":"e_1_3_2_2_22_1","unstructured":"Nate Foster , Dexter Kozen , Konstantinos Mamouras , Mark Reitblatt , and Alexandra Silva . 2016. Probabilistic NetKAT . In Programming Languages and Systems, Peter Thiemann (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 282\u2013309. Nate Foster, Dexter Kozen, Konstantinos Mamouras, Mark Reitblatt, and Alexandra Silva. 2016. Probabilistic NetKAT. In Programming Languages and Systems, Peter Thiemann (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 282\u2013309."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"volume-title":"PSI: Exact Symbolic Inference for Probabilistic Programs","year":"2016","author":"Gehr Timon","key":"e_1_3_2_2_24_1","unstructured":"Timon Gehr , Sasa Misailovic , and Martin Vechev . 2016 . PSI: Exact Symbolic Inference for Probabilistic Programs . In Computer Aided Verification, Swarat Chaudhuri and Azadeh Farzan (Eds.). Springer International Publishing , Cham , 62\u201383. Timon Gehr, Sasa Misailovic, and Martin Vechev. 2016. PSI: Exact Symbolic Inference for Probabilistic Programs. In Computer Aided Verification, Swarat Chaudhuri and Azadeh Farzan (Eds.). Springer International Publishing, Cham, 62\u201383."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.3102\/1076998615606113"},{"volume-title":"Tenenbaum","year":"2008","author":"Goodman Noah D.","key":"e_1_3_2_2_26_1","unstructured":"Noah D. Goodman , Vikash K. Mansinghka , Daniel Roy , Keith Bonawitz , and Joshua B . Tenenbaum . 2008 . Church : A Language for Generative Models. In Proceedings of the Twenty-Fourth Conference on Uncertainty in Artificial Intelligence (UAI\u201908). AUAI Press , Arlington, Virginia, United States, 220\u2013229. http:\/\/dl.acm.org\/citation.cfm?id=3023476. 3023503 Noah D. Goodman, Vikash K. Mansinghka, Daniel Roy, Keith Bonawitz, and Joshua B. Tenenbaum. 2008. Church: A Language for Generative Models. In Proceedings of the Twenty-Fourth Conference on Uncertainty in Artificial Intelligence (UAI\u201908). AUAI Press, Arlington, Virginia, United States, 220\u2013229. http:\/\/dl.acm.org\/citation.cfm?id=3023476. 3023503"},{"volume-title":"Retrieved","year":"2014","author":"Goodman Noah D","key":"e_1_3_2_2_27_1","unstructured":"Noah D Goodman and Andreas Stuhlm\u00fcller . 2014 . The Design and Implementation of Probabilistic Programming Languages. (2014) . Retrieved April 18, 2018 from http:\/\/dippl.org Noah D Goodman and Andreas Stuhlm\u00fcller. 2014. The Design and Implementation of Probabilistic Programming Languages. (2014). Retrieved April 18, 2018 from http:\/\/dippl.org"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593900"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2992"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062375"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594303"},{"volume-title":"Introduction to network simulator NS2","author":"Issariyakul Teerawat","key":"e_1_3_2_2_32_1","unstructured":"Teerawat Issariyakul and Ekram Hossain . 2011. Introduction to network simulator NS2 . Springer Science & amp; Business Media. Teerawat Issariyakul and Ekram Hossain. 2011. Introduction to network simulator NS2. Springer Science & Business Media."},{"volume-title":"JoostPieter Katoen, and Lukas Westhofen.","year":"2016","author":"Jansen Nils","key":"e_1_3_2_2_33_1","unstructured":"Nils Jansen , Christian Dehnert , Benjamin Lucien Kaminski , JoostPieter Katoen, and Lukas Westhofen. 2016 . Bounded Model Checking for Probabilistic Programs. In Automated Technology for Verification and Analysis, Cyrille Artho, Axel Legay, and Doron Peled (Eds.). Springer International Publishing , Cham, 68\u201385. Nils Jansen, Christian Dehnert, Benjamin Lucien Kaminski, JoostPieter Katoen, and Lukas Westhofen. 2016. Bounded Model Checking for Probabilistic Programs. In Automated Technology for Verification and Analysis, Cyrille Artho, Axel Legay, and Doron Peled (Eds.). Springer International Publishing, Cham, 68\u201385."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"volume-title":"Proceedings of the 17th International Conference on Static Analysis (SAS\u201910)","author":"Katoen Joost-Pieter","key":"e_1_3_2_2_35_1","unstructured":"Joost-Pieter Katoen , Annabelle K. McIver , Larissa A. Meinicke , and Carroll C. Morgan . 2010. Linear-invariant Generation for Probabilistic Programs: Automated Support for Proof-based Methods . In Proceedings of the 17th International Conference on Static Analysis (SAS\u201910) . Springer-Verlag, Berlin, Heidelberg, 390\u2013406. Joost-Pieter Katoen, Annabelle K. McIver, Larissa A. Meinicke, and Carroll C. Morgan. 2010. Linear-invariant Generation for Probabilistic Programs: Automated Support for Proof-based Methods. In Proceedings of the 17th International Conference on Static Analysis (SAS\u201910). Springer-Verlag, Berlin, Heidelberg, 390\u2013406."},{"volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912)","year":"2012","author":"Kazemian Peyman","key":"e_1_3_2_2_37_1","unstructured":"Peyman Kazemian , George Varghese , and Nick McKeown . 2012 . Header Space Analysis: Static Checking for Networks . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912) . USENIX Association, Berkeley, CA, USA, 9\u20139. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228311 Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912). USENIX Association, Berkeley, CA, USA, 9\u20139. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228311"},{"volume-title":"Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201913)","author":"Khurshid Ahmed","key":"e_1_3_2_2_38_1","unstructured":"Ahmed Khurshid , Xuan Zou , Wenxuan Zhou , Matthew Caesar , and P. Brighten Godfrey . 2013. VeriFlow: Verifying Network-wide Invariants in Real Time . In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201913) . USENIX Association, Berkeley, CA, USA, 15\u201328. http:\/\/dl.acm.org\/citation.cfm? id=2482626.2482630 Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2013. VeriFlow: Verifying Network-wide Invariants in Real Time. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201913). USENIX Association, Berkeley, CA, USA, 15\u201328. http:\/\/dl.acm.org\/citation.cfm? id=2482626.2482630"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2933575.2933610"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2050490"},{"key":"e_1_3_2_2_43_1","unstructured":"Vikash Mansinghka Daniel Selsam and Yura Perov. 2014. Venture: a Higher-order Probabilistic Programming Platform with Programmable Inference. arXiv: 1404.0099 Retrieved from https:\/\/arxiv.org\/abs\/1404. 0099 . Vikash Mansinghka Daniel Selsam and Yura Perov. 2014. Venture: a Higher-order Probabilistic Programming Platform with Programmable Inference. arXiv: 1404.0099 Retrieved from https:\/\/arxiv.org\/abs\/1404. 0099 ."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.15"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/647169.718164"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2482626.2482629"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/229542.229547"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"J. Moy. 1998. OSPF Version 2. RFC 2328 (Standard). (April 1998). http:\/\/www.ietf.org\/rfc\/rfc2328.txt J. Moy. 1998. OSPF Version 2. RFC 2328 (Standard). (April 1998). http:\/\/www.ietf.org\/rfc\/rfc2328.txt","DOI":"10.17487\/rfc2328"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3088525.3088564"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2930611.2930626"},{"volume-title":"Probabilistic Inference by Program Transformation in Hakaru (System Description)","author":"Narayanan Praveen","key":"e_1_3_2_2_52_1","unstructured":"Praveen Narayanan , Jacques Carette , Wren Romano , Chung-chieh Shan, and Robert Zinkov . 2016. Probabilistic Inference by Program Transformation in Hakaru (System Description) . Springer International Publishing , Cham , 62\u201379. Praveen Narayanan, Jacques Carette, Wren Romano, Chung-chieh Shan, and Robert Zinkov. 2016. Probabilistic Inference by Program Transformation in Hakaru (System Description). Springer International Publishing, Cham, 62\u201379."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616496"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2892753.2892895"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737982"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3176"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Y. Rekhter T. Li and S. Hares. 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard). (Jan. 2006). http:\/\/www.ietf.org\/ rfc\/rfc4271.txt Y. Rekhter T. Li and S. Hares. 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard). (Jan. 2006). http:\/\/www.ietf.org\/ rfc\/rfc4271.txt","DOI":"10.17487\/rfc4271"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462179"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009852"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009843"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009845"},{"volume":"2","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems -","author":"Tristan Jean-Baptiste","key":"e_1_3_2_2_62_1","unstructured":"Jean-Baptiste Tristan , Daniel Huang , Joseph Tassarotti , Adam Pocock , Stephen J. Green , and Guy L . Steele, Jr. 2014. Augur: Data-parallel Probabilistic Modeling . In Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 (NIPS\u201914). MIT Press, Cambridge, MA, USA, 2600\u20132608. http:\/\/dl.acm.org\/citation. cfm?id=2969033.2969117 Jean-Baptiste Tristan, Daniel Huang, Joseph Tassarotti, Adam Pocock, Stephen J. Green, and Guy L. Steele, Jr. 2014. Augur: Data-parallel Probabilistic Modeling. In Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 (NIPS\u201914). MIT Press, Cambridge, MA, USA, 2600\u20132608. http:\/\/dl.acm.org\/citation. cfm?id=2969033.2969117"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060315"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/1416222.1416290"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"volume-title":"Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, AISTATS 2014","year":"2014","author":"Wood Frank D.","key":"e_1_3_2_2_66_1","unstructured":"Frank D. Wood , Jan-Willem van de Meent, and Vikash Mansinghka. 2014. A New Approach to Probabilistic Programming Inference . In Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, AISTATS 2014 , Reykjavik, Iceland , April 22-25, 2014 . 1024\u20131032. http:\/\/jmlr.org\/proceedings\/papers\/v33\/wood14.html Frank D. Wood, Jan-Willem van de Meent, and Vikash Mansinghka. 2014. A New Approach to Probabilistic Programming Inference. In Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, AISTATS 2014, Reykjavik, Iceland, April 22-25, 2014. 1024\u20131032. http:\/\/jmlr.org\/proceedings\/papers\/v33\/wood14.html"},{"volume-title":"Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI\u201916)","year":"2016","author":"Wu Yi","key":"e_1_3_2_2_67_1","unstructured":"Yi Wu , Lei Li , Stuart Russell , and Rastislav Bodik . 2016 . Swift: Compiled Inference for Probabilistic Programming Languages . In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI\u201916) . AAAI Press, 3637\u20133645. http:\/\/dl.acm.org\/citation.cfm?id= 3061053.3061128 Yi Wu, Lei Li, Stuart Russell, and Rastislav Bodik. 2016. Swift: Compiled Inference for Probabilistic Programming Languages. In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI\u201916). AAAI Press, 3637\u20133645. http:\/\/dl.acm.org\/citation.cfm?id= 3061053.3061128"}],"event":{"name":"PLDI '18: ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Philadelphia PA USA","acronym":"PLDI '18"},"container-title":["Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3192366.3192400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T20:32:47Z","timestamp":1693859567000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3192366.3192400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":66,"alternative-id":["10.1145\/3192366.3192400","10.1145\/3192366"],"URL":"http:\/\/dx.doi.org\/10.1145\/3192366.3192400","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3296979.3192400","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2018,6,11]]},"assertion":[{"value":"2018-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}