{"version":"1.0","provider_name":"IEEE International Conference on Pervasive Computing and Communication","provider_url":"https:\/\/percom.org\/2025","author_name":"zarubag","author_url":"https:\/\/percom.org\/2025\/author\/zarubag\/","title":"Call for Artifacts - IEEE International Conference on Pervasive Computing and Communication","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vqBU4NwNPY\"><a href=\"https:\/\/percom.org\/2025\/call-for-artifacts\/\">Call for Artifacts<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/percom.org\/2025\/call-for-artifacts\/embed\/#?secret=vqBU4NwNPY\" width=\"600\" height=\"338\" title=\"&#8220;Call for Artifacts&#8221; &#8212; IEEE International Conference on Pervasive Computing and Communication\" data-secret=\"vqBU4NwNPY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/percom.org\/2025\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Like in the past years, we encourage authors of papers published at PERCOM 2025 and affiliated events to participate in an Artifact Evaluation process. Authors who choose to participate can provide supplementary materials as artifacts (tools, applications, data sets, etc.) that will be reviewed solely for functional completeness (e.g., does provided code compile and run","thumbnail_url":"https:\/\/percom.org\/2025\/wp-content\/uploads\/2024\/11\/reproducibility_badges_1-1.png"}