{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:45Z","timestamp":1755838725265},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319999326"},{"type":"electronic","value":"9783319999333"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99933-3_1","type":"book-chapter","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T12:33:39Z","timestamp":1535200419000},"page":"3-7","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Intelligent Software Engineering: Synergy Between AI and Software Engineering"],"prefix":"10.1007","author":[{"given":"Tao","family":"Xie","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,26]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Acharya, M., Xie, T., Pei, J., Xu, J.: Mining API patterns as partial orders from source code: from usage scenarios to specifications. In: Proceedings of the Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering (ESEC-FSE), pp. 25\u201334 (2007)","DOI":"10.1145\/1287624.1287630"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Allamanis, M., Barr, E.T., Devanbu, P., Sutton, C.: A survey of machine learning for big code and naturalness, September 2017. arXiv:1709.06182","DOI":"10.1145\/3212695"},{"key":"1_CR3","unstructured":"Balog, M., Gaunt, A.L., Brockschmidt, M., Nowozin, S., Tarlow, D.: DeepCoder: learning to write programs. In: Proceedings of the International Conference on Learning Representations (ICLR) (2017)"},{"key":"1_CR4","unstructured":"Barr, A.: Google mistakenly tags black people as \u2018gorillas\u2019, showing limits of algorithms. Wall Str. J. (2015). http:\/\/blogs.wsj.com\/digits\/2015\/07\/01\/google-mistakenly-tags-black-people-as-gorillas-showing-limits-of-algorithms\/"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Beschastnikh, I., Lungu, M.F., Zhuang, Y.: Accelerating software engineering research adoption with analysis bots. In: Proceedings of the International Conference on Software Engineering (ICSE), New Ideas and Emerging Results Track, pp. 35\u201338 (2017)","DOI":"10.1109\/ICSE-NIER.2017.17"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Bieliauskas, S., Schreiber, A.: A conversational user interface for software visualization. In: Proceedings of the IEEE Working Conference on Software Visualization (VISSOFT), pp. 139\u2013143 (2017)","DOI":"10.1109\/VISSOFT.2017.21"},{"key":"1_CR7","series-title":"Belknap Press Series","volume-title":"Foundations of Social Theory","author":"J Coleman","year":"1990","unstructured":"Coleman, J.: Foundations of Social Theory. Belknap Press Series. Belknap Press of Harvard University Press, Cambridge (1990)"},{"key":"1_CR8","unstructured":"Committee on Technology National Science and Technology Council and Penny Hill Press: Preparing for the Future of Artificial Intelligence. CreateSpace Independent Publishing Platform, USA (2016)"},{"key":"1_CR9","unstructured":"Ernst, M.D.: Natural language is a programming language: applying natural language processing to software development. In: Proceedings of the 2nd Summit on Advances in Programming Languages (SNAPL), pp. 4:1\u20134:14 (2017)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Gu, X., Zhang, H., Zhang, D., Kim, S.: Deep API learning. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE), pp. 631\u2013642 (2016)","DOI":"10.1145\/2950290.2950334"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Gu, X., Zhang, H., Zhang, D., Kim, S.: DeepAM: migrate APIs with multi-modal sequence to sequence learning. In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), pp. 3675\u20133681 (2017)","DOI":"10.24963\/ijcai.2017\/514"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Gupta, R., Pal, S., Kanade, A., Shevade, S.: DeepFix: fixing common C language errors by deep learning. In: Proceedings of the National Conference on Artificial Intelligence (AAAI) (2017)","DOI":"10.1609\/aaai.v31i1.10742"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Harman, M.: The role of artificial intelligence in software engineering. In: Proceedings International Workshop on Realizing AI Synergies in Software Engineering (RAISE), pp. 1\u20136 (2012)","DOI":"10.1109\/RAISE.2012.6227961"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Jordan, M.: Artificial intelligence-the revolution hasn\u2019t happened yet, April 2018. https:\/\/medium.com\/@mijordan3\/artificial-intelligence-the-revolution-hasnt-happened-yet-5e1d5812e1e7","DOI":"10.1162\/99608f92.f06c6e61"},{"key":"1_CR15","unstructured":"Lebeuf, C., Storey, M.D., Zagalsky, A.: How software developers mitigate collaboration friction with chatbots. CoRR abs\/1702.07011 (2017). http:\/\/arxiv.org\/abs\/1702.07011"},{"key":"1_CR16","unstructured":"Leetaru, K.: How Twitter corrupted Microsoft\u2019s Tay: a crash course in the dangers of AI in the real world. Forbes (2016). https:\/\/www.forbes.com\/sites\/kalevleetaru\/2016\/03\/24\/how-twitter-corrupted-microsofts-tay-a-crash-course-in-the-dangers-of-ai-in-the-real-world\/"},{"key":"1_CR17","unstructured":"Li, F.F.: How to make A.I. that\u2019s good for people, March 2018. https:\/\/www.nytimes.com\/2018\/03\/07\/opinion\/artificial-intelligence-human.html"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Michail, A., Xie, T.: Helping users avoid bugs in GUI applications. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 107\u2013116 (2005)","DOI":"10.1145\/1062455.1062490"},{"key":"1_CR19","unstructured":"Murphy, C., Kaiser, G.E.: Improving the dependability of machine learning applications. Technical report, CUCS-049-, Department of Computer Science, Columbia University (2008)"},{"key":"1_CR20","unstructured":"Pandita, R., Xiao, X., Yang, W., Enck, W., Xie, T.: WHYPER: towards automating risk assessment of mobile applications. In: Proceedings of the USENIX Conference on Security (SEC), pp. 527\u2013542 (2013)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Pandita, R., Xiao, X., Zhong, H., Xie, T., Oney, S., Paradkar, A.: Inferring method specifications from natural language API descriptions. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 815\u2013825 (2012)","DOI":"10.1109\/ICSE.2012.6227137"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Pei, K., Cao, Y., Yang, J., Jana, S.: DeepXplore: automated whitebox testing of deep learning systems. In: Proceedings of the Symposium on Operating Systems Principles (SOSP), pp. 1\u201318 (2017)","DOI":"10.1145\/3132747.3132785"},{"key":"1_CR23","unstructured":"Qin, Y., Xie, T., Xu, C., Astorga, A., Lu, J.: CoMID: context-based multi-invariant detection for monitoring cyber-physical software. CoRR abs\/1807.02282 (2018). https:\/\/arxiv.org\/abs\/1807.02282"},{"issue":"C","key":"1_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks. Neural Netw. 61(C), 85\u2013117 (2015)","journal-title":"Neural Netw."},{"key":"1_CR25","unstructured":"Srisakaokul, S., Wu, Z., Astorga, A., Alebiosu, O., Xie, T.: Multiple-implementation testing of supervised learning software. In: Proceedings of the AAAI-2018 Workshop on Engineering Dependable and Secure Machine Learning Systems (EDSMLS) (2018)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Storey, M.D., Zagalsky, A.: Disrupting developer productivity one bot at a time. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE), pp. 928\u2013931 (2016)","DOI":"10.1145\/2950290.2983989"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pei, K., Jana, S., Ray, B.: DeepTest: automated testing of deep-neural-network-driven autonomous cars. In: Proceedings International Conference on Software Engineering (ICSE), pp. 303\u2013314 (2018)","DOI":"10.1145\/3180155.3180220"},{"key":"1_CR28","unstructured":"Turing, A.M.: Computing machinery and intelligence (1950). One of the most influential papers in the history of the cognitive sciences. http:\/\/cogsci.umn.edu\/millennium\/final.html"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, L., Xie, T., Anvik, J., Sun, J.: An approach to detecting duplicate bug reports using natural language and execution information. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 461\u2013470 (2008)","DOI":"10.1145\/1368088.1368151"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Xiao, X., Paradkar, A., Thummalapenta, S., Xie, T.: Automated extraction of security policies from natural-language software documents. In: Proceedings of the ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE), pp. 12:1\u201312:11 (2012)","DOI":"10.1145\/2393596.2393608"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Xie, T.: Intelligent software engineering: synergy between AI and software engineering. In: Proceedings of the Innovations in Software Engineering Conference (ISEC), p. 1:1 (2018)","DOI":"10.1145\/3172871.3172891"},{"issue":"8","key":"1_CR32","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MC.2009.256","volume":"42","author":"T Xie","year":"2009","unstructured":"Xie, T., Thummalapenta, S., Lo, D., Liu, C.: Data mining for software engineering. Computer 42(8), 55\u201362 (2009)","journal-title":"Computer"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Yang, W., Kong, D., Xie, T., Gunter, C.A.: Malware detection in adversarial settings: exploiting feature evolutions and confusions in Android apps. In: Proceedings Annual Computer Security Applications Conference (ACSAC), pp. 288\u2013302 (2017)","DOI":"10.1145\/3134600.3134642"},{"key":"1_CR34","unstructured":"Yang, W., Xie, T.: Telemade: a testing framework for learning-based malware detection systems. In: Proceedings AAAI-2018 Workshop on Engineering Dependable and Secure Machine Learning Systems (EDSMLS) (2018)"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Yin, P., Neubig, G.: A syntactic neural model for general-purpose code generation. In: Proceedings of the Annual Meeting of the Association for Computational Linguistics (ACL) (2017)","DOI":"10.18653\/v1\/P17-1041"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Zheng, W., Ma, H., Lyu, M.R., Xie, T., King, I.: Mining test oracles of web search engines. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 408\u2013411 (2011)","DOI":"10.1109\/ASE.2011.6100085"},{"key":"1_CR37","unstructured":"Zheng, W., et al.: Oracle-free detection of translation issue for neural machine translation. CoRR abs\/1807.02340 (2018). https:\/\/arxiv.org\/abs\/1807.02340"},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-03013-0_15","volume-title":"ECOOP 2009 \u2013 Object-Oriented Programming","author":"H Zhong","year":"2009","unstructured":"Zhong, H., Xie, T., Zhang, L., Pei, J., Mei, H.: MAPO: mining and recommending API usage patterns. In: Drossopoulou, S. (ed.) ECOOP 2009. LNCS, vol. 5653, pp. 318\u2013343. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03013-0_15"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Zhong, H., Zhang, L., Xie, T., Mei, H.: Inferring resource specifications from natural language API documentation. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 307\u2013318 (2009)","DOI":"10.1109\/ASE.2009.94"},{"key":"1_CR40","unstructured":"Zhong, Z., et al.: Generating regular expressions from natural language specifications: are we there yet? In: Proceedings of the Workshop on NLP for Software Engineering (NL4SE) (2018)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99933-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T08:52:04Z","timestamp":1661849524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99933-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319999326","9783319999333"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99933-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}