{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:39:30Z","timestamp":1770273570795,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/icse.2013.6606596","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:38:03Z","timestamp":1380652683000},"page":"502-511","source":"Crossref","is-referenced-by-count":117,"title":["Lase: Locating and applying systematic edits by learning from examples"],"prefix":"10.1109","author":[{"given":"Na","family":"Meng","sequence":"first","affiliation":[]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kathryn S.","family":"McKinley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"161","article-title":"Interactive simultaneous editing of multiple text regions","author":"miller","year":"2001","journal-title":"2002 USENIX Annual Technical Conference"},{"key":"17","first-page":"365","article-title":"Finding application errors and security flaws using PQL: A program query language","author":"martin","year":"2005","journal-title":"ACM conference on object-oriented programming systems languages and applications"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993537"},{"key":"15","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1145\/1095430.1081755","article-title":"PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code","author":"li","year":"2005","journal-title":"ACM Foundations of Software Engineering"},{"key":"16","article-title":"On the maximum common embedded subtree problem for ordered trees","author":"lozano","year":"2004","journal-title":"String Algorithmics Chapter 7"},{"key":"13","first-page":"209","author":"lau","year":"2001","journal-title":"Learning Repetitive Text-editing Procedures with SMARTedit"},{"key":"14","first-page":"289","article-title":"CP-Miner: A tool for finding copy-paste and related bugs in operating system code","author":"li","year":"2004","journal-title":"ACM Symposium on Operating System Design and Implementation"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070531"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806847"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869486"},{"key":"22","first-page":"40","article-title":"An empirical study of supplementary bug fixes","author":"park","year":"2012","journal-title":"IEEE Working Conference on Mining Software Repositories"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393659"},{"key":"25","article-title":"Fix me up: Repairing access-control bugs in web applications","author":"son","year":"2013","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"26","first-page":"379","article-title":"AutoISES: Automatically inferring security specifications and detecting violations","author":"tan","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859091"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351753"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.44"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0271(74)90020-5"},{"key":"30","first-page":"318","article-title":"MAPO: Mining and recommending api usage patterns","author":"zhong","year":"2009","journal-title":"Proceedings of European Conference of Object-Oriented Programming"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1836089.1836091"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/502039.502041"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368154"},{"key":"9","article-title":"Automated concurrencybug fixing","author":"jin","year":"2012","journal-title":"Symposium on Operating System Design and Implementation"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/359581.359603"}],"event":{"name":"2013 35th International Conference on Software Engineering (ICSE)","location":"San Francisco, CA, USA","start":{"date-parts":[[2013,5,18]]},"end":{"date-parts":[[2013,5,26]]}},"container-title":["2013 35th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596173\/6606539\/06606596.pdf?arnumber=6606596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:55:44Z","timestamp":1498085744000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6606596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icse.2013.6606596","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}