{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:38:53Z","timestamp":1729672733775,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/ijcnn.2018.8489079","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T18:25:09Z","timestamp":1539973509000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["A New Word Embedding Approach to Evaluate Potential Fixes for Automated Program Repair"],"prefix":"10.1109","author":[{"given":"Leonardo Afonso","family":"Amorim","sequence":"first","affiliation":[]},{"given":"Mateus F.","family":"Freitas","sequence":"additional","affiliation":[]},{"given":"Altino","family":"Dantas","sequence":"additional","affiliation":[]},{"given":"Eduardo F.","family":"de Souza","sequence":"additional","affiliation":[]},{"given":"Celso G.","family":"Camilo-Junior","sequence":"additional","affiliation":[]},{"given":"Wellington S.","family":"Martins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.69"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950295"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.65"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.04.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-016-0804-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2442754.2442763"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884848"},{"key":"ref12","article-title":"Adapting word2vec to named entity recognition","author":"siencnik","year":"2015","journal-title":"NoDaLiDa"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454513"},{"key":"ref15","article-title":"Distributed representations of sentences and documents","volume":"abs 1405 4053","author":"le","year":"2014","journal-title":"CoRR"},{"key":"ref16","first-page":"171","article-title":"Linguistic regularities in sparse and explicit word representations","author":"levy","year":"2014","journal-title":"Proceedings of the Conference on Computer Communications"},{"key":"ref17","article-title":"Efficient estimation of word representations in vector space","volume":"abs 1301 3781","author":"mikolov","year":"2013","journal-title":"CoRR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/00437956.1954.11659520"},{"key":"ref19","article-title":"word2vec parameter learning explained","volume":"abs 1411 2738","author":"rong","year":"2014","journal-title":"CoRR"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630793"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.63"},{"journal-title":"Software fail watch","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.60"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312918"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227211"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.13"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v31i1.10742","article-title":"Deepfix: Fixing common c language errors by deep learning","author":"gupta","year":"2017","journal-title":"Proceedings of the 31ft AAAI Conference on Artificial Intelligence"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336534"},{"key":"ref20","first-page":"957","article-title":"From word embeddings to document distances","author":"kusner","year":"2015","journal-title":"Proceedings of the 32nd International Conference on Machine Learning (ICML-15)"},{"key":"ref22","first-page":"226","author":"jobstmann","year":"2005","journal-title":"Program Repair as a Game"},{"key":"ref21","first-page":"173","author":"gopinath","year":"2011","journal-title":"Specification-Based Program Repair Using SAT"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.01.023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630793"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570031"}],"event":{"name":"2018 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8465565\/8488986\/08489079.pdf?arnumber=8489079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T05:30:25Z","timestamp":1662269425000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8489079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2018.8489079","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}