{"response":{"docs":[{"system_create_dtsi":"2022-01-31T20:20:24Z","system_modified_dtsi":"2022-02-01T00:04:14Z","has_model_ssim":["GenericWork"],"id":"gb19f719x","accessControl_ssim":["a5628f2e-c55d-4743-8e64-10a28a9a3437"],"hasRelatedMediaFragment_ssim":["k930bz54b"],"hasRelatedImage_ssim":["k930bz54b"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Data of Classifying I/O Variables via Machine Learning"],"date_uploaded_dtsi":"2022-01-31T20:20:23Z","date_modified_dtsi":"2022-02-01T00:04:14Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/85j1-qf68"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Lin, Xuanyi","Niu, Nan","Peng, Zedong"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["We provide the source files (user manuals of SWMM, SWAT, and MODFLOW), as well as our manually-labeled I/O variables."],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"thumbnail_path_ss":"/downloads/k930bz54b?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ht24wm28t","5425kc26p","k930bz54b","sf268658r","rb68xd565","qn59q563q","z890rv94p","kp78gh964"],"file_set_ids_ssim":["ht24wm28t","5425kc26p","k930bz54b","sf268658r","rb68xd565","qn59q563q","z890rv94p","kp78gh964"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DATA OF CLASSIFYING IO VARIABLES VIA MACHINE LEARNING","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["gb19f719x"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1723516960021413888,"timestamp":"2022-02-01T00:04:18.663Z","score":0.00049999997},{"system_create_dtsi":"2020-12-12T14:59:25Z","system_modified_dtsi":"2020-12-12T15:05:30Z","has_model_ssim":["GenericWork"],"id":"vq27zp91w","accessControl_ssim":["32b3bfb1-c729-4703-bc8d-a425e5c61f07"],"hasRelatedMediaFragment_ssim":["1n79h5793"],"hasRelatedImage_ssim":["1n79h5793"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Data of SWMM I/O Associations"],"date_uploaded_dtsi":"2020-12-12T14:59:22Z","date_modified_dtsi":"2020-12-12T15:05:01Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/0mn5-p763"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Niu, Nan","Lin, Xuanyi","Peng, Zedong"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Software Engineering","Compuer Science","Scientific Software"],"description_tesim":["SWMM I/O variables, I/O associations from the user manual, and I/O associations from the user forum (Open SWMM)."],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"date_created_tesim":["2020-12-12"],"thumbnail_path_ss":"/downloads/1n79h5793?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["4b29b7569","1n79h5793","1544bq62d"],"file_set_ids_ssim":["4b29b7569","1n79h5793","1544bq62d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DATA OF SWMM IO ASSOCIATIONS","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["vq27zp91w"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697101865979740160,"timestamp":"2021-04-15T10:27:41.910Z","score":0.00049999997},{"system_create_dtsi":"2020-09-06T02:57:51Z","system_modified_dtsi":"2020-09-06T02:59:40Z","has_model_ssim":["GenericWork"],"id":"2f75r9290","accessControl_ssim":["28846e2c-4f47-4a3d-a34f-2bd19ac61c1e"],"hasRelatedMediaFragment_ssim":["r494vm490"],"hasRelatedImage_ssim":["r494vm490"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Code for SWMM's metamorphic testing"],"date_uploaded_dtsi":"2020-09-06T02:57:49Z","date_modified_dtsi":"2020-09-06T02:59:37Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/ravz-y408"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Niu, Nan","Lin, Xuanyi"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Source code used to conduct metamorphic testing of SWMM"],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["r494vm490"],"file_set_ids_ssim":["r494vm490"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CODE FOR SWMMS METAMORPHIC TESTING","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["2f75r9290"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697079496449982464,"timestamp":"2021-04-15T04:32:08.663Z","score":0.00049999997},{"system_create_dtsi":"2020-05-22T16:42:15Z","system_modified_dtsi":"2020-05-22T22:03:18Z","has_model_ssim":["GenericWork"],"id":"j3860821t","accessControl_ssim":["96188d4e-ce7f-4b22-b27a-ec49da531ff7"],"hasRelatedMediaFragment_ssim":["3j333346p"],"hasRelatedImage_ssim":["3j333346p"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Data of SysML SMD Environment Assumptions"],"date_uploaded_dtsi":"2020-05-22T16:42:15Z","date_modified_dtsi":"2020-05-22T22:03:12Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/n0g0-j524"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Alenazi, Mounifah","Niu, Nan"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Software Engineering","Model-Driven Engineering","Requirements Engineering"],"description_tesim":["Environment assumptions elicited from human modelers for a SysML state machine diagram (SMD) in the context of satisfaction of a safety requirement."],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"date_created_tesim":["2020-05-22"],"thumbnail_path_ss":"/downloads/3j333346p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3j333346p"],"file_set_ids_ssim":["3j333346p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DATA OF SYSML SMD ENVIRONMENT ASSUMPTIONS","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["j3860821t"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697096227183656960,"timestamp":"2021-04-15T08:58:04.335Z","score":0.00049999997},{"system_create_dtsi":"2019-09-02T11:10:15Z","system_modified_dtsi":"2019-09-05T11:17:52Z","has_model_ssim":["Article"],"id":"rv042v465","accessControl_ssim":["ba77c5c8-c27f-45a7-9f14-09490e60c105"],"hasRelatedMediaFragment_ssim":["6395w833q"],"hasRelatedImage_ssim":["6395w833q"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["A Process Mining Approach to Improving Defect Detection of SysML Models"],"date_uploaded_dtsi":"2019-09-02T11:10:15Z","date_modified_dtsi":"2019-09-05T11:17:36Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/6rna-m982"],"alternate_title_tesim":["ASE 2019 Late Breaking Results (LBR) Track"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Alenazi, Mounifah","Niu, Nan","Savolainen, Juha"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["model-driven engineering","model checking","defect detection","mutation testing","process mining","systems modeling language (SysML)"],"language_tesim":["English"],"description_tesim":["The development of complex and dependable systems like autonomous vehicles relies increasingly on the use of systems modeling language (SysML). In fact, SysML has become a de facto standard for systems engineering. With model-driven engineering, a SysML model serves as a reference for the early defect detection of the system under design: the earlier the errors are detected, the less is the cost of handling the errors. Mutation testing is a fault-based technique that has recently seen its applications to SysML behavioral models (e.g., state machine diagrams). Specifically, a system's state-transition design can be fed to a model checker where mutants are automatically generated and then killed against the desired design specifications (e.g., safety properties). In this paper, we present a novel approach based on process mining to improve the effectiveness and efficiency of the SysML mutation testing based on model checking. In our approach, the mutation operators are applied directly to the state machine diagram. These mutants are then fed as traces into a process mining tool and checked according to the event logs. Our initial results indicates that the process mining approach kills more mutants faster than the model checking method."],"license_tesim":["http://www.opendatacommons.org/licenses/by/1.0/"],"date_created_tesim":["2019-09-02"],"thumbnail_path_ss":"/downloads/6395w833q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6395w833q"],"file_set_ids_ssim":["6395w833q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PROCESS MINING APPROACH TO IMPROVING DEFECT DETECTION OF SYSML MODELS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["rv042v465"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697116423868907520,"timestamp":"2021-04-15T14:19:05.395Z","score":0.00049999997},{"system_create_dtsi":"2019-06-16T03:04:36Z","system_modified_dtsi":"2019-06-30T19:52:15Z","has_model_ssim":["GenericWork"],"id":"vx021g24n","accessControl_ssim":["2eb49ba6-b484-444c-80b9-3022fba4c01d"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Data of SysML Modeling Mistakes"],"date_uploaded_dtsi":"2019-06-16T03:04:36Z","date_modified_dtsi":"2019-06-30T19:50:49Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/sz4r-zx36"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Alenazi, Mounifah","Niu, Nan","Savolainen, Juha"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Data extraction results of a systematic mapping on the SysML modeling mistakes"],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"date_created_tesim":["2019-06-15"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["9w032432z","7w62f943t","cc08hg915"],"file_set_ids_ssim":["9w032432z","7w62f943t","cc08hg915"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DATA OF SYSML MODELING MISTAKES","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["vx021g24n"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697103830649405440,"timestamp":"2021-04-15T10:58:55.565Z","score":0.00049999997},{"system_create_dtsi":"2019-06-09T15:15:12Z","system_modified_dtsi":"2019-06-09T15:17:27Z","has_model_ssim":["GenericWork"],"id":"sj139314x","accessControl_ssim":["143794a1-c4fd-45d6-9bb9-da1820d43f90"],"hasRelatedMediaFragment_ssim":["ft848r703"],"hasRelatedImage_ssim":["ft848r703"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Data of Software Engineering Interviews and Video Resumes"],"date_uploaded_dtsi":"2019-06-09T15:15:12Z","date_modified_dtsi":"2019-06-09T15:17:23Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/x5vq-8r81"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"note_tesim":["The file also contains the label (0: not hireable, 1: hireable) for each of the data points."],"creator_tesim":["Niu, Nan","Gudaparthi, Hemanth"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["hireability prediction","machine learning","software engineering"],"description_tesim":["Software engineering candidate interviews and video resumes from YouTube; as of June 2019, there are 180 data points in total"],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"date_created_tesim":["2019-06-09"],"thumbnail_path_ss":"/downloads/ft848r703?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ft848r703"],"file_set_ids_ssim":["ft848r703"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DATA OF SOFTWARE ENGINEERING INTERVIEWS AND VIDEO RESUMES","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["sj139314x"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697103852952616960,"timestamp":"2021-04-15T10:59:16.835Z","score":0.00049999997},{"system_create_dtsi":"2019-03-06T17:28:06Z","system_modified_dtsi":"2021-04-16T14:56:47Z","has_model_ssim":["Document"],"id":"b5644s654","accessControl_ssim":["5862c667-fa75-4e0e-8ef3-19af03d61462"],"hasRelatedMediaFragment_ssim":["3t945r88s"],"hasRelatedImage_ssim":["3t945r88s"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Multivariate Public Key Cryptosystems"],"date_uploaded_dtsi":"2019-03-06T17:28:06Z","date_modified_dtsi":"2020-08-12T19:17:25Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/5sqr-g734"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam","Petzoldt, Albrecht","Ding, Jintai"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Programs used and described in the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt.   All programs can be downloaded via the attached zip file.  Modify the file \"startup.txt\"  so that the base directory  matches your setup. Put this file where magma can find it. \r\n After starting magma  run:  load \"startup.txt\";   It will then allow you to select the method on which you want to work.\r\n\r\n\r\nFiles can be downloaded individually by clicking on a chapter name and then selecting the scheme of interest.\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"source_tesim":["b5644s654"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0k225b94v","0g354g08r","0c483m090","2801ph54m","6t053g89c","3t945r88s","vm40xs59m","pn89d7644","sf268653c"],"file_set_ids_ssim":["0k225b94v","0g354g08r","0c483m090","2801ph54m","6t053g89c","3t945r88s","vm40xs59m","pn89d7644","sf268653c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["b5644s654"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697209393578246144,"timestamp":"2021-04-16T14:56:48.219Z","score":0.00049999997},{"system_create_dtsi":"2017-10-27T02:37:57Z","system_modified_dtsi":"2019-06-06T15:15:18Z","has_model_ssim":["GenericWork"],"id":"bc386v78m","accessControl_ssim":["6beae00a-f621-491a-a122-981fb3d71703"],"hasRelatedMediaFragment_ssim":["bc387w77q"],"hasRelatedImage_ssim":["bc387w780"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Study Materials of Complementarity in Requirements Tracing"],"date_uploaded_dtsi":"2017-02-16T00:00:00Z","date_modified_dtsi":"2017-06-29T00:00:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C20P4S"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Niu, Nan","Wen Tao Wang"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Information of complementarity analysis of tagging-to-trace and learning-to-trace practices.  "],"license_tesim":["http://creativecommons.org/licenses/by/4.0/"],"thumbnail_path_ss":"/downloads/bc387w780?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bc387x44c","bc387w76f","bc387w798","bc387w801","bc387w780","bc387x45n","bc387w77q"],"file_set_ids_ssim":["bc387x44c","bc387w76f","bc387w798","bc387w801","bc387w780","bc387x45n","bc387w77q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"STUDY MATERIALS OF COMPLEMENTARITY IN REQUIREMENTS TRACING","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["khatwacu@mail.uc.edu","niunn@ucmail.uc.edu","wang2wt@mail.uc.edu"],"nesting_collection__pathnames_ssim":["bc386v78m"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697108298188193792,"timestamp":"2021-04-15T12:09:56.142Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Generic Work","hits":7,"label":"Generic Work"},{"value":"Article","hits":1,"label":"Article"},{"value":"Document","hits":1,"label":"Document"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Niu, Nan","hits":8,"label":"Niu, Nan"},{"value":"Alenazi, Mounifah","hits":3,"label":"Alenazi, Mounifah"},{"value":"Lin, Xuanyi","hits":3,"label":"Lin, Xuanyi"},{"value":"Peng, Zedong","hits":2,"label":"Peng, Zedong"},{"value":"Savolainen, Juha","hits":2,"label":"Savolainen, Juha"},{"value":"Ding, Jintai","hits":1,"label":"Ding, Jintai"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Software Engineering","hits":2,"label":"Software Engineering"},{"value":"Compuer Science","hits":1,"label":"Compuer Science"},{"value":"Model-Driven Engineering","hits":1,"label":"Model-Driven Engineering"},{"value":"Requirements Engineering","hits":1,"label":"Requirements Engineering"},{"value":"Scientific Software","hits":1,"label":"Scientific Software"},{"value":"defect detection","hits":1,"label":"defect detection"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Engineering and Applied Science","hits":9,"label":"Engineering and Applied Science"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- Computing Sciences \u0026 Informatics","hits":9,"label":"- Computing Sciences \u0026 Informatics"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":9,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2019-06-09","hits":1,"label":"2019-06-09"},{"value":"2019-06-15","hits":1,"label":"2019-06-15"},{"value":"2019-09-02","hits":1,"label":"2019-09-02"},{"value":"2020-05-22","hits":1,"label":"2020-05-22"},{"value":"2020-12-12","hits":1,"label":"2020-12-12"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":9,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":9,"first_page?":true,"last_page?":true}}}