{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T06:44:55Z","timestamp":1748501095310,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10109-y","type":"journal-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T03:04:22Z","timestamp":1604891062000},"page":"9209-9229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Predictive approaches for the UNIX command line: curating and exploiting domain knowledge in semantics deficit data"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9906-9136","authenticated-orcid":false,"given":"Thoudam Doren","family":"Singh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6621-1810","authenticated-orcid":false,"given":"Abdullah Faiz Ur Rahman","family":"Khilji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7901-9745","authenticated-orcid":false,"family":"Divyansha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4061-531X","authenticated-orcid":false,"given":"Apoorva Vikram","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4749-0038","authenticated-orcid":false,"given":"Surmila","family":"Thokchom","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2607-1774","authenticated-orcid":false,"given":"Sivaji","family":"Bandyopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"10109_CR1","doi-asserted-by":"crossref","unstructured":"Alsuhaibani M, Bollegala D, Maehara T, Kawarabayashi K (2018) Jointly learning word embeddings using a corpus and a knowledge base, vol 13","DOI":"10.1371\/journal.pone.0193094"},{"issue":"9-10","key":"10109_CR2","doi-asserted-by":"publisher","first-page":"1599","DOI":"10.1007\/s10994-017-5651-7","volume":"106","author":"P Daee","year":"2017","unstructured":"Daee P, Peltola T, Soare M, Kaski S (2017) Knowledge elicitation via sequential probabilistic inference for high-dimensional prediction. Mach. Learn. 106(9-10):1599\u20131620","journal-title":"Mach. Learn."},{"key":"10109_CR3","unstructured":"Davison BD, Hirsh H (1997) Experiments in unix command prediction. In: AAAI\/IAAI, p 827"},{"key":"10109_CR4","unstructured":"Davison BD, Hirsh H (1997) Toward an adaptive command line interface. In: HCI (2), pp 505\u2013508"},{"key":"10109_CR5","unstructured":"Davison BD, Hirsh H (1998) Predicting sequences of user actions. In: Notes of the AAAI\/ICML 1998 workshop on predicting the future: AI approaches to time-series analysis, pp 5\u201312"},{"key":"10109_CR6","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert:, Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805"},{"issue":"Jul","key":"10109_CR7","first-page":"2121","volume":"12","author":"J Duchi","year":"2011","unstructured":"Duchi J, Hazan E, Singer Y (2011) Adaptive subgradient methods for online learning and stochastic optimization. J. Mach. Learn. Res. 12 (Jul):2121\u20132159","journal-title":"J. Mach. Learn. Res."},{"key":"10109_CR8","unstructured":"Durant KT, Smith MD (2002) Predicting unix commands using decision tables and decision trees. In: WIT transactions on information and communication technologies, p 28"},{"key":"10109_CR9","unstructured":"Goldberg Y, Levy O (2014) Word2vec explained:, deriving mikolov others.\u2019s negative-sampling word-embedding method. arXiv:1402.3722"},{"key":"10109_CR10","unstructured":"Greenberg S (1988) Using unix: Collected traces of 168 users"},{"key":"10109_CR11","doi-asserted-by":"crossref","unstructured":"Heimerl F, Lohmann S, Lange S, Ertl T (2014) Word cloud explorer: Text analytics based on word clouds. In: System sciences (HICSS), 2014 47th Hawaii international conference on. IEEE, pp 1833\u20131842","DOI":"10.1109\/HICSS.2014.231"},{"key":"10109_CR12","unstructured":"Hendrycks D, Gimpel K (2016) Bridging nonlinearities and stochastic regularizers with gaussian error linear units. 1"},{"issue":"8","key":"10109_CR13","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"10109_CR14","unstructured":"Jacobs N (2000) The learning shell. In: Adaptive user interfaces, papers from the 2000 AAAI spring symposium, pp 50\u201353"},{"key":"10109_CR15","unstructured":"Jernite Y, Bowman SR, Sontag D (2017) Discourse-based objectives for fast unsupervised sentence representation learning. arXiv:1705.00557"},{"key":"10109_CR16","unstructured":"Korvemaker B, Greiner R (2000) Predicting unix command lines: adjusting to user patterns. In: AAAI\/IAAI, pp 230\u2013235"},{"key":"10109_CR17","unstructured":"Lane T, Brodley CE (1997) An application of machine learning to anomaly detection. In: Proceedings of the 20th national information systems security conference. Baltimore, USA, vol 377, pp 366\u2013380"},{"key":"10109_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1162\/tacl_a_00134","volume":"3","author":"O Levy","year":"2015","unstructured":"Levy O, Goldberg Y, Dagan I (2015) Improving distributional similarity with lessons learned from word embeddings. Trans Assoc Comput Linguist 3:211\u2013225","journal-title":"Trans Assoc Comput Linguist"},{"key":"10109_CR19","unstructured":"Lin XV, Wang C, Zettlemoyer L, Ernst MD (2018) Nl2bash:, A corpus and semantic parser for natural language interface to the linux operating system. arXiv:1802.08979"},{"key":"10109_CR20","unstructured":"Logeswaran L, Lee H (2018) An efficient framework for learning sentence representations. arXiv:1803.02893"},{"key":"10109_CR21","doi-asserted-by":"crossref","unstructured":"Mikolov T, Karafi\u00e1t M., Burget L, \u010cernocky\u0300 J, Khudanpur S (2010) Recurrent neural network based language model. In: Eleventh annual conference of the international speech communication association","DOI":"10.1109\/ICASSP.2011.5947611"},{"key":"10109_CR22","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning C (2014) Glove: Global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"issue":"3","key":"10109_CR23","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TPAMI.2009.187","volume":"32","author":"JD Rodriguez","year":"2010","unstructured":"Rodriguez JD, Perez A, Lozano JA (2010) Sensitivity analysis of k-fold cross validation in prediction error estimation. IEEE Trans Pattern Anal Mach Intell 32(3):569\u2013575","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10109_CR24","unstructured":"Schonlau M, DuMouchel W, Ju WH, Karr AF, Theus M, Vardi Y (2001) Computer intrusion: Detecting masquerades. Stat Sci 58\u201374"},{"key":"10109_CR25","unstructured":"Shirai K, Sornlertlamvanich V, Marukata S et al (2016) Recurrent neural network with word embedding for complaint classification. In: Proceedings of the third international workshop on worldwide language service infrastructure and second workshop on open infrastructures and analysis frameworks for human language technologies (WLSI\/OIAF4HLT2016), pp 36\u201343"},{"issue":"4","key":"10109_CR26","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1177\/107769905303000401","volume":"30","author":"WL Taylor","year":"1953","unstructured":"Taylor WL (1953) \u201cCloze procedure\u201d: A new tool for measuring readability. Journal Q 30(4):415\u2013433","journal-title":"Journal Q"},{"key":"10109_CR27","doi-asserted-by":"crossref","unstructured":"Yoshida K (1994) User command prediction by graph-based induction. In: Tools with artificial intelligence, 1994. Proceedings., sixth international conference on. IEEE, pp 732\u2013735","DOI":"10.1109\/TAI.1994.346414"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10109-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10109-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10109-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:47:18Z","timestamp":1614635238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10109-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10109"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10109-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"29 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}