{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:25:06Z","timestamp":1730294706468,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054849","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T03:47:32Z","timestamp":1585885652000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["Referee: A Pattern-Guided Approach for Auto Design in Compiler-Based Analyzers"],"prefix":"10.1109","author":[{"given":"Fang","family":"Lv","sequence":"first","affiliation":[]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huimin","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Xiaobing","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-46148-5_5","article-title":"A machine learning approach to automatic production of compiler heuristics","author":"monsifrot","year":"2002","journal-title":"Artificial Intelligence Methodology Systems and Applications"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384628"},{"key":"ref33","article-title":"Using machine learning to automate compiler optimisation","author":"thomson","year":"2008","journal-title":"Tech Rep"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191546"},{"key":"ref31","first-page":"4","author":"datta","year":"2008","journal-title":"Stencil computation optimization and auto-tuning on state-of-the-art multicore architectures"},{"key":"ref30","first-page":"11","article-title":"Using machine learning to focus iterative optimization","author":"agakov","year":"0","journal-title":"International Symposium on Code Generation and Optimization"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669124"},{"key":"ref36","first-page":"41","article-title":"A machine learning approach to automatic production of compiler heuristics","author":"monsifrot","year":"2002","journal-title":"Methods and Applications of Artificial Intelligence"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996864"},{"key":"ref34","first-page":"319","article-title":"Fast and effective orchestration of compiler optimizations for automatic performance tuning","author":"pan","year":"2006","journal-title":"Fourth IEEE\/ACM International Symposium on Code Generation and Optimization ser CGO 2006"},{"journal-title":"Iterative Compilation in a Non-linear Optimisation Space","year":"1998","author":"bodin","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658076"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2000.888348"},{"journal-title":"Google java style guide","year":"2017","key":"ref2"},{"journal-title":"Alibaba java coding guidelines pmd implements and ide plugin","year":"2017","key":"ref1"},{"journal-title":"Parasoft JTest","year":"2019","author":"jtest","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.60"},{"journal-title":"Rubocop","year":"2019","key":"ref21"},{"journal-title":"PVS-Studio analyzer","year":"2019","author":"p -s","key":"ref24"},{"journal-title":"The Astree Static Analyzer","year":"2019","key":"ref23"},{"key":"ref26","first-page":"281","article-title":"Learning natural coding conventions","author":"allamanis","year":"2014","journal-title":"Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering ser FSE 2014"},{"journal-title":"PMD","year":"2019","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238170"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/3238147.3238166","article-title":"Deep learning based feature envy detection","author":"liu","year":"2018","journal-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering - ASE 2018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.04.002"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.19"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1145\/2737924.2737969","article-title":"Autotuning algorithmic choice for input sensitivity","author":"ding","year":"2015","journal-title":"Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation ser PLDI '15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243754"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134620"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2628071.2628087"},{"journal-title":"Continuous bag of words","year":"2019","key":"ref12"},{"journal-title":"Coverity static application security testing","year":"2019","key":"ref13"},{"journal-title":"A simple but tough-to-beat baseline for sentence embeddings","year":"2016","author":"arora","key":"ref14"},{"journal-title":"Euclidean distance","year":"2019","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49815-7_9"},{"journal-title":"CheckStyle","year":"2019","key":"ref17"},{"journal-title":"Checkmarx","year":"2019","key":"ref18"},{"journal-title":"FindBugs Find Bugs in Java Programs","year":"2019","key":"ref19"},{"journal-title":"Coverity static application security testing","year":"2019","key":"ref4"},{"journal-title":"Code conventions for the java programming language Contents","year":"1997","key":"ref3"},{"journal-title":"Gjb 5369 2005 space model software language c safe subset","year":"2005","key":"ref6"},{"journal-title":"Misra 2012","year":"2012","key":"ref5"},{"journal-title":"Stanford Natural Language Processing Tool","year":"2014","author":"manning","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950349"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882338"},{"journal-title":"kmeans","year":"2019","key":"ref9"},{"key":"ref46","first-page":"81:1","article-title":"A survey of machine learning for big code and naturalness","volume":"51","author":"allamanis","year":"2018","journal-title":"ACM Comput Surv"},{"key":"ref45","volume":"abs 1805 3441","author":"wang","year":"2018","journal-title":"Machine learning in compiler optimisation"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1145\/2568225.2568307","article-title":"Detecting memory leaks through introspective dynamic behavior modelling using machine learning","author":"lee","year":"2014","journal-title":"Proceedings of the 36th International Conference on Software Engineering Ser ICSE 2014"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2017.7863731"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764677"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2597809.2597811","article-title":"Exploiting function similarity for code size reduction","author":"von koch","year":"2014","journal-title":"Proceedings of the 2014 SIGPLAN\/SIGBED Conference on Languages Compilers and Tools for Embedded Systems ser LCTES &#x2018;14"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661174"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2020,2,18]]},"location":"London, ON, Canada","end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054849.pdf?arnumber=9054849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:55:29Z","timestamp":1656438929000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054849","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}