{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:11Z","timestamp":1742913551395,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":65,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642451348"},{"type":"electronic","value":"9783642451355"}],"license":[{"start":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T00:00:00Z","timestamp":1387497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T00:00:00Z","timestamp":1387497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-45135-5_16","type":"book-chapter","created":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T09:11:18Z","timestamp":1398849078000},"page":"421-453","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Recommending Program Transformations"],"prefix":"10.1007","author":[{"given":"Miryung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Na","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,20]]},"reference":[{"key":"16_CR1","unstructured":"Andersen, J.: Semantic patch inference. Ph.D. thesis, University of Copenhagen (2009)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Andersen, J., Lawall, J.L.: Generic patch inference. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 337\u2013346 (2008). doi:10.1109\/ASE.2008.44","DOI":"10.1109\/ASE.2008.44"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Baxter, I.D., Pidgeon, C., Mehlich, M.: DMS: program transformations for practical scalable software evolution. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 625\u2013634 (2004). doi:10.1109\/ICSE.2004.1317484","DOI":"10.1109\/ICSE.2004.1317484"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Boshernitsan, M., Graham, S.L., Hearst, M.A.: Aligning development tools with the way programmers think about code changes. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 567\u2013576 (2007). doi:10.1145\/1240624.1240715","DOI":"10.1145\/1240624.1240715"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Breu, S., Zimmermann, T.: Mining aspects from version history. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 221\u2013230 (2006). doi:10.1109\/ASE.2006.50","DOI":"10.1109\/ASE.2006.50"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Canfora, G., Cerulo, L., Cimitile, M., Di Penta, M.: Social interactions around cross-system bug fixings: the case of FreeBSD and OpenBSD. In: Proceedings of the International Working Conference on Mining Software Repositories, pp. 143\u2013152 (2011). doi:10.1145\/1985441.1985463","DOI":"10.1145\/1985441.1985463"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Castro, S., Brichau, J., Mens, K.: Diagnosis and semi-automatic correction of detected design inconsistencies in source code. In: Proceedings of the International Workshop on Smalltalk Technologies, pp. 8\u201317 (2009). doi:10.1145\/1735935.1735938","DOI":"10.1145\/1735935.1735938"},{"issue":"3","key":"16_CR8","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.scico.2006.04.002","volume":"61","author":"J.R. Cordy","year":"2006","unstructured":"Cordy, J.R.: The TXL source transformation language. Sci. Comput. Program. 61(3), 190\u2013210 (2006). doi:10.1016\/j.scico.2006.04.002","journal-title":"Sci. Comput. Program."},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11603023_7","volume-title":"Practical Aspects of Declarative Languages. Lecture Notes in Computer Science","author":"K. De Volder","year":"2006","unstructured":"De Volder, K.: JQuery: a generic code browser with a declarative configuration language. In: Hentenryck, P. (ed.) Practical Aspects of Declarative Languages. Lecture Notes in Computer Science, vol. 3819, pp. 88\u2013102. Springer, Heidelberg (2006). doi:10.1007\/11603023_7"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko, E., Robillard, M.P.: Clone region descriptors: representing and tracking duplication in source code. ACM T. Software Eng. Meth. 20(1), 3:1\u20133:31 (2010). doi:10.1145\/1767751.1767754","DOI":"10.1145\/1767751.1767754"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TSE.2008.36","volume":"34","author":"M. Eaddy","year":"2008","unstructured":"Eaddy, M., Zimmermann, T., Sherwood, K.D., Garg, V., Murphy, G.C., Nagappan, N., Aho, A.V.: Do crosscutting concerns cause defects? IEEE T. Software Eng. 34(4), 497\u2013515 (2008). doi:10.1109\/TSE.2008.36","journal-title":"IEEE T. Software Eng."},{"issue":"11","key":"16_CR12","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TSE.2007.70731","volume":"33","author":"B. Fluri","year":"2007","unstructured":"Fluri, B., W\u00fcrsch, M., Pinzger, M., Gall, H.C.: Change distilling: tree differencing for fine-grained source code change extraction. IEEE T. Software Eng. 33(11), 725\u2013743 (2007). doi:10.1109\/TSE.2007.70731","journal-title":"IEEE T. Software Eng."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Gulwani, S.: Dimensions in program synthesis. In: Proceedings of the ACM SIGPLAN International Symposium on Principles and Practice of Declarative Programming, pp. 13\u201324 (2010). doi:10.1145\/1836089.1836091","DOI":"10.1145\/1836089.1836091"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Gulwani, S.: Automating string processing in spreadsheets using input\u2013output examples. In: Proceedings of the ACM SIGPLAN Conference on Principles of Programming Languages, pp. 317\u2013330 (2011). http:\/\/doi.acm.org\/10.1145\/1926385.1926423","DOI":"10.1145\/1925844.1926423"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Gulwani, S., Korthikanti, V.A., Tiwari, A.: Synthesizing geometry constructions. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 50\u201361 (2011). http:\/\/doi.acm.org\/10.1145\/1993498.1993505","DOI":"10.1145\/1993316.1993505"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Harris, W.R., Gulwani, S.: Spreadsheet table transformations from examples. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 317\u2013328 (2011). doi:10.1145\/1993498.1993536","DOI":"10.1145\/1993316.1993536"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Henkel, J., Diwan, A.: CatchUp!: capturing and replaying refactorings to support API evolution. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 274\u2013283 (2005). doi:10.1145\/1062455.1062512","DOI":"10.1145\/1062455.1062512"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Jacobellis, J., Meng, N., Kim, M.: LASE: an example-based program transformation tool for locating and applying systematic edits. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 1319\u20131322 (2013). doi:10.1109\/ICSE.2013.6606707","DOI":"10.1109\/ICSE.2013.6606707"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Kapur, P., Cossette, B., Walker, R.J.: Refactoring references for library migration. In: Proceedings of the ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 726\u2013738 (2010). doi:10.1145\/1869459.1869518","DOI":"10.1145\/1932682.1869518"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-77042-8_6","volume-title":"Transactions on Aspect-Oriented Software Development IV. Lecture Notes in Computer Science","author":"A. Kellens","year":"2007","unstructured":"Kellens, A., Mens, K., Tonella, P.: A survey of automated code-level aspect mining techniques. In: Rashid, A., Aksit, M. (eds.) Transactions on Aspect-Oriented Software Development IV. Lecture Notes in Computer Science, vol. 4640, pp. 143\u2013162. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-77042-8_6"},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume":"1241","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Proceedings of the European Conference on Object-Oriented Programming. Lecture Notes in Computer Science, vol. 1241, pp. 220\u2013242 (1997). doi:10.1007\/BFb0053381","journal-title":"In: Proceedings of the European Conference on Object-Oriented Programming. Lecture Notes in Computer Science"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Kim, M., Cai, D., Kim, S.: An empirical investigation into the role of API-level refactorings during software evolution. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 151\u2013160 (2011). doi:10.1145\/1985793.1985815","DOI":"10.1145\/1985793.1985815"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Kim, M., Notkin, D.: Discovering and representing systematic code changes. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 309\u2013319 (2009). doi:10.1109\/ICSE.2009.5070531","DOI":"10.1109\/ICSE.2009.5070531"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Kim, M., Sazawal, V., Notkin, D., Murphy, G.: An empirical study of code clone genealogies. In: Proceedings of the European Software Engineering Conference\/ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 187\u2013196 (2005). doi:10.1145\/1081706.1081737","DOI":"10.1145\/1095430.1081737"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Kim, M., Zimmermann, T., Nagappan, N.: A field study of refactoring challenges and benefits. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 50:1\u201350:11 (2012). doi:10.1145\/2393596.2393655","DOI":"10.1145\/2393596.2393655"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Kim, S., Pan, K., Whitehead Jr., E.E.J.: Memories of bug fixes. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 35\u201345 (2006). doi:10.1145\/1181775.1181781","DOI":"10.1145\/1181775.1181781"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Landauer, J., Hirakawa, M.: Visual AWK: a model for text processing by demonstration. In: Proceedings of the IEEE International Symposium on Visual Languages, pp. 267\u2013274 (1995). doi:10.1109\/VL.1995.520818","DOI":"10.1109\/VL.1995.520818"},{"key":"16_CR28","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/B978-155860688-3\/50012-9","volume-title":"Your Wish is My Command: Programming by Example","author":"T. Lau","year":"2001","unstructured":"Lau, T., Wolfman, S.A., Domingos, P., Weld, D.S.: Learning repetitive text-editing procedures with SMARTedit. In: Lieberman, H. (ed.) Your Wish is My Command: Programming by Example, pp. 209\u2013226. Morgan Kaufmann, Los Altos, CA (2001)"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhou, Y.: PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In: Proceedings of the European Software Engineering Conference\/ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 306\u2013315 (2005). doi:10.1145\/1081706.1081755","DOI":"10.1145\/1095430.1081755"},{"volume-title":"Your Wish Is My Command: Programming by Example","year":"2001","key":"16_CR30","unstructured":"Lieberman, H. (ed.): Your Wish Is My Command: Programming by Example. Morgan Kaufmann, Los Altos, CA (2001)"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Martin, M., Livshits, B., Lam, M.S.: Finding application errors and security flaws using PQL: a program query language. In: Proceedings of the ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 365\u2013383 (2005). doi:10.1145\/1094811.1094840","DOI":"10.1145\/1103845.1094840"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Masui, T., Nakayama, K.: Repeat and predict: two keys to efficient text editing. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 118\u2013130 (1994). doi:10.1145\/191666.191722","DOI":"10.1145\/191666.191722"},{"issue":"7\u20138","key":"16_CR33","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1080\/088395197117975","volume":"11","author":"D. Maulsby","year":"1997","unstructured":"Maulsby, D., Witten, I.H.: Cima: an interactive concept learning system for end-user applications. Appl. Artif. Intell.: Int. J. 11(7\u20138), 653\u2013671 (1997). doi:10.1080\/088395197117975","journal-title":"Appl. Artif. Intell.: Int. J."},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"McIntyre, M., Walker, R.J.: Assisting potentially-repetitive small-scale changes via semi-automated heuristic search. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 497\u2013500 (2007). doi:10.1145\/1321631.1321718","DOI":"10.1145\/1321631.1321718"},{"key":"16_CR35","volume-title":"Supporting repetitive small-scale changes","author":"M. McIntyre","year":"2007","unstructured":"McIntyre, M.: Supporting repetitive small-scale changes. MSc thesis, University of Calgary (2007)"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Meng, N., Kim, M., McKinley, K.S.: Sydit: creating and applying a program transformation from an example. In: Proceedings of the European Software Engineering Conference\/ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 440\u2013443 (2011a). doi:10.1145\/2025113.2025185","DOI":"10.1145\/2025113.2025185"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Meng, N., Kim, M., McKinley, K.S.: Systematic editing: generating program transformations from an example. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 329\u2013342 (2011b). doi:10.1145\/1993498.1993537","DOI":"10.1145\/1993498.1993537"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Meng, N., Kim, M., McKinley, K.S.: LASE: locating and applying systematic edits by learning from examples. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 502\u2013511 (2013). doi:10.1109\/ICSE.2013.6606596","DOI":"10.1109\/ICSE.2013.6606596"},{"key":"16_CR39","doi-asserted-by":"publisher","unstructured":"Mens, K., Lozano, A.: Source code based recommendation systems. In: Robillard, M., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering. Springer, Heidelberg, Chap.\u20095. (2014)","DOI":"10.1007\/978-3-642-45135-5_5"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Mens, K., Wuyts, R., D\u2019Hondt, T.: Declaratively codifying software architectures using virtual software classifications. In: Proceedings of the International Conference on Technology of Object-Oriented Languages and Systems, pp. 33\u201345 (1999). doi:10.1109\/TOOLS.1999.778997","DOI":"10.1109\/TOOLS.1999.778997"},{"key":"16_CR41","unstructured":"Miller, R.C., Myers, B.A.: Interactive simultaneous editing of multiple text regions. In: Proceedings of the USENIX Annual Technical Conference, pp. 161\u2013174 (2001)"},{"key":"16_CR42","doi-asserted-by":"crossref","unstructured":"Mu\u015flu, K., Brun, Y., Holmes, R., Ernst, M.D., Notkin, D.: Speculative analysis of integrated development environment recommendations. In: Proceedings of the ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 669\u2013682 (2012). doi:10.1145\/2384616.2384665","DOI":"10.1145\/2398857.2384665"},{"issue":"1","key":"16_CR43","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2011.41","volume":"38","author":"E. Murphy-Hill","year":"2011","unstructured":"Murphy-Hill, E., Parnin, C., Black, A.P.: How we refactor, and how we know it. IEEE T. Software Eng. 38(1), 5\u201318 (2011). doi:10.1109\/TSE.2011.41","journal-title":"IEEE T. Software Eng."},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Nguyen, H.A., Nguyen, T.T., Wilson Jr., G., Nguyen, A.T., Kim, M., Nguyen, T.N.: A graph-based approach to API usage adaptation. In: Proceedings of the ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 302\u2013321 (2010a). doi:10.1145\/1869459.1869486","DOI":"10.1145\/1932682.1869486"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Nguyen, H.A., Pham, N.H., Al-Kofahi, J., Nguyen, T.N.: Recurring bug fixes in object-oriented programs. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 315\u2013324 (2010b). doi:10.1145\/1806799.1806847","DOI":"10.1145\/1806799.1806847"},{"key":"16_CR46","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Nguyen, H.A., Pham, N.H., Al-Kofahi, J.M., Nguyen, T.N.: Clone-aware configuration management. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 123\u2013134 (2009). doi:10.1109\/ASE.2009.90","DOI":"10.1109\/ASE.2009.90"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Nix, R.: Editing by example. In: Proceedings of the ACM SIGPLAN Conference on Principles of Programming Languages, pp. 186\u2013195 (1984). doi:10.1145\/800017.800530","DOI":"10.1145\/800017.800530"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Padioleau, Y., Lawall, J., Hansen, R.R., Muller, G.: Documenting and automating collateral evolutions in Linux device drivers. In: Proceedings of the ACM SIGOPS\/EuroSys European Conference on Computer Systems, pp. 247\u2013260 (2008). doi:10.1145\/1352592.1352618","DOI":"10.1145\/1357010.1352618"},{"key":"16_CR49","doi-asserted-by":"crossref","unstructured":"Park, J., Kim, M., Ray, B., Bae, D.H.: An empirical study of supplementary bug fixes. In: Proceedings of the International Working Conference on Mining Software Repositories, pp. 40\u201349 (2012). doi:10.1109\/MSR.2012.6224298","DOI":"10.1109\/MSR.2012.6224298"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Perkins, J.H., Kim, S., Larsen, S., Amarasinghe, S., Bachrach, J., Carbin, M., Pacheco, C., Sherwood, F., Sidiroglou, S., Sullivan, G., Wong, W.F., Zibin, Y., Ernst, M.D., Rinard, M.: Automatically patching errors in deployed software. In: Proceedings of the ACM Symposium on Operating Systems Principles, pp. 87\u2013102 (2009). doi:10.1145\/1629575.1629585","DOI":"10.1145\/1629575.1629585"},{"key":"16_CR51","doi-asserted-by":"crossref","unstructured":"Person, S., Dwyer, M.B., Elbaum, S., P\u0103s\u0103reanu, C.S.: Differential symbolic execution. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 226\u2013237 (2008). doi:10.1145\/1453101.1453131","DOI":"10.1145\/1453101.1453131"},{"key":"16_CR52","doi-asserted-by":"crossref","unstructured":"Pollock, L.: Leveraging natural language analysis of software: achievements, challenges, and opportunities. In: Proceedings of the IEEE International Conference on Software Maintenance, p. 4 (2012). doi:10.1109\/ICSM.2012.6405245","DOI":"10.1109\/ICSM.2012.6405245"},{"issue":"6","key":"16_CR53","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TSE.2005.74","volume":"31","author":"R. Purushothaman","year":"2005","unstructured":"Purushothaman, R., Perry, D.E.: Toward understanding the rhetoric of small source code changes. IEEE T. Software Eng. 31(6), 511\u2013526 (2005). doi:10.1109\/TSE.2005.74","journal-title":"IEEE T. Software Eng."},{"key":"16_CR54","doi-asserted-by":"crossref","unstructured":"Ray, B., Kim, M.: A case study of cross-system porting in forked projects. In: Proceedings of the European Software Engineering Conference\/ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 53:1\u201353:11 (2012). doi:10.1145\/2393596.2393659","DOI":"10.1145\/2393596.2393659"},{"key":"16_CR55","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-540-87875-9_13","volume":"5301","author":"R. Robbes","year":"2008","unstructured":"Robbes, R., Lanza, M.: Example-based program transformation. In: Proceedings of the International Conference on Model-Driven Engineering of Languages and Systems. Lecture Notes in Computer Science, vol. 5301, pp. 174\u2013188 (2008). doi:10.1007\/978-3-540-87875-9_13","journal-title":"In: Proceedings of the International Conference on Model-Driven Engineering of Languages and Systems. Lecture Notes in Computer Science"},{"key":"16_CR56","doi-asserted-by":"crossref","unstructured":"Schaefer, M., de Moor, O.: Specifying and implementing refactorings. In: Proceedings of the ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 286\u2013301 (2010). doi:10.1145\/1869459.1869485","DOI":"10.1145\/1932682.1869485"},{"key":"16_CR57","doi-asserted-by":"crossref","unstructured":"Shepherd, D., Fry, Z.P., Hill, E., Pollock, L., Vijay-Shanker, K.: Using natural language program analysis to locate and understand action-oriented concerns. In: Proceedings of the International Conference on Aspect-Oriented Software Deveopment, pp. 212\u2013224 (2007). doi:10.1145\/1218563.1218587","DOI":"10.1145\/1218563.1218587"},{"key":"16_CR58","doi-asserted-by":"crossref","unstructured":"Solar-Lezama, A., Arnold, G., Tancau, L., Bodik, R., Saraswat, V., Seshia, S.: Sketching stencils. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 167\u2013178 (2007). doi:10.1145\/1250734.1250754","DOI":"10.1145\/1273442.1250754"},{"key":"16_CR59","doi-asserted-by":"crossref","unstructured":"Tarr, P., Ossher, H., Harrison, W., Stanley M. Sutton, J.: N degrees of separation: multi-dimensional separation of concerns. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 107\u2013119 (1999). doi:10.1145\/302405.302457","DOI":"10.1145\/302405.302457"},{"key":"16_CR60","doi-asserted-by":"crossref","unstructured":"Toomim, M., Begel, A., Graham, S.L.: Managing duplicated code with linked editing. In: Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, pp. 173\u2013180 (2004). http:\/\/dx.doi.org\/10.1109\/VLHCC.2004.35","DOI":"10.1109\/VLHCC.2004.35"},{"key":"16_CR61","doi-asserted-by":"publisher","unstructured":"Walker, R.J., Holmes, R.: Simulation: a methodology to evaluate recommendation systems in software engineering. In: Robillard, M., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering. Springer, Heidelberg, Chap.\u200912. (2014)","DOI":"10.1007\/978-3-642-45135-5_12"},{"key":"16_CR62","doi-asserted-by":"crossref","unstructured":"Wang, X., Lo, D., Cheng, J., Zhang, L., Mei, H., Yu, J.X.: Matching dependence-related queries in the system dependence graph. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 457\u2013466 (2010). doi:10.1145\/1858996.1859091","DOI":"10.1145\/1858996.1859091"},{"key":"16_CR63","doi-asserted-by":"crossref","unstructured":"Weimer, W., Nguyen, T., Le Goues, C., Forrest, S.: Automatically finding patches using genetic programming. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, pp. 364\u2013374 (2009). doi:10.1109\/ICSE.2009.5070536","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"16_CR64","doi-asserted-by":"crossref","unstructured":"Wei\u00dfgerber, P., Diehl, S.: Are refactorings less error-prone than other changes? In: Proceedings of the International Workshop on Mining Software Repositories, pp. 112\u2013118 (2006). doi:10.1145\/1137983.1138011","DOI":"10.1145\/1137983.1138011"},{"key":"16_CR65","unstructured":"Witten, I.H., Mo, D.: TELS: Learning Text Editing Tasks from Examples, pp. 183\u2013203. MIT, Cambridge, MA (1993)"}],"container-title":["Recommendation Systems in Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45135-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T01:49:28Z","timestamp":1676857768000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-45135-5_16"}},"subtitle":["Automating Repetitive Software Changes"],"short-title":[],"issued":{"date-parts":[[2013,12,20]]},"ISBN":["9783642451348","9783642451355"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45135-5_16","relation":{},"subject":[],"published":{"date-parts":[[2013,12,20]]},"assertion":[{"value":"20 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}