{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:28:23Z","timestamp":1769282903852,"version":"3.49.0"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902169"],"award-info":[{"award-number":["61902169"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Program","award":["KQTD2016112514355531"],"award-info":[{"award-number":["KQTD2016112514355531"]}]},{"name":"Science and Technology Innovation Committee Foundation of Shenzhen","award":["JCYJ20170817110848086"],"award-info":[{"award-number":["JCYJ20170817110848086"]}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP200101374"],"award-info":[{"award-number":["DP200101374"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP170100891"],"award-info":[{"award-number":["LP170100891"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DE170101081"],"award-info":[{"award-number":["DE170101081"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP200101328"],"award-info":[{"award-number":["DP200101328"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018AAA0102100"],"award-info":[{"award-number":["2018AAA0102100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang public welfare technology","award":["LGF20F020013"],"award-info":[{"award-number":["LGF20F020013"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFC0118802"],"award-info":[{"award-number":["2019YFC0118802"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017242","name":"National Institutes for Food and Drug Control","doi-asserted-by":"publisher","award":["2019YFB1404802"],"award-info":[{"award-number":["2019YFB1404802"]}],"id":[{"id":"10.13039\/100017242","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["III-1526499"],"award-info":[{"award-number":["III-1526499"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["III-1763325"],"award-info":[{"award-number":["III-1763325"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["III-1909323"],"award-info":[{"award-number":["III-1909323"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1930941"],"award-info":[{"award-number":["CNS-1930941"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tse.2020.2979701","type":"journal-article","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T20:22:21Z","timestamp":1583871741000},"page":"102-119","source":"Crossref","is-referenced-by-count":87,"title":["Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention"],"prefix":"10.1109","volume":"48","author":[{"given":"Wenhua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuqun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9510-6574","authenticated-orcid":false,"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Wan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6121-0384","authenticated-orcid":false,"given":"Zhou","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3491-5968","authenticated-orcid":false,"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4493-6663","authenticated-orcid":false,"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"issue":"6","key":"ref1","article-title":"Software maintenance management","volume-title":"IEE Proc. E Comput. Digit. Techn. Trans. Softw. Eng.","volume":"127","author":"Lientz"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100145"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180222"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786880"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-019-00512-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0562-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180198"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00033"},{"key":"ref11","article-title":"Charactering and detecting CUDA program bugs","author":"Wu","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2017.26"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380358"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2911283"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.47"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330559"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950295"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00075"},{"key":"ref21","article-title":"Agile software development methods review and analysis","author":"Abrahamsson","year":"2002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.76"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1085313.1085331"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/b:lida.0000048322.42751.ca"},{"key":"ref26","first-page":"35","article-title":"Natural language models for predicting programming comments","volume-title":"Proc. 51st Annu. Meeting Assoc. Comput. Linguistics","author":"Movshovitz-Attias"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1195"},{"key":"ref28","first-page":"391","article-title":"From query to usable code: An analysis of stack overflow code snippets","volume-title":"Proc. IEEE\/ACM 13th Work. Conf. Mining Softw. Repositories","author":"Yang"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2560165"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.118"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.36"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859006"},{"key":"ref33","first-page":"2091","article-title":"A convolutional attention network for extreme summarization of source code","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Allamanis"},{"issue":"3","key":"ref34","first-page":"258","article-title":"Automatic comment generation using a neural translation model","volume":"55","author":"Haije","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/314"},{"key":"ref37","article-title":"Sequence level training with recurrent neural networks","author":"Ranzato","year":"2015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1137"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238206"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref41","article-title":"Improving neural language models with a continuous cache","author":"Grave","year":"2016"},{"key":"ref42","first-page":"708","article-title":"Bugram: Bug detection with N-gram language models","volume-title":"Proc. 31st IEEE\/ACM Int. Conf. Autom. Softw. Eng.","author":"Wang"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/5.880083"},{"key":"ref44","first-page":"419","article-title":"A fast and simple algorithm for training neural probabilistic language models","author":"Mnih"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2004.842673"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"ref48","volume-title":"Introduction to Reinforcement Learning","volume":"135","author":"Sutton","year":"1998"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"issue":"3\/4","key":"ref50","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1023\/A:1022676722315","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2929141"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1137\/s0363012901385691"},{"key":"ref53","first-page":"1008","article-title":"Actor-critic algorithms","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Konda"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref56","article-title":"code2seq: Generating sequences from structured representations of code","author":"Alon","year":"2018"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313632"},{"issue":"8","key":"ref58","article-title":"Compilers, principles, techniques","volume":"7","author":"Aho","year":"1986","journal-title":"Addison Wesley"},{"key":"ref60","article-title":"graph2vec: Learning distributed representations of graphs","author":"Narayanan","year":"2017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n16-1174"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29513-4_31"},{"key":"ref63","first-page":"3543","article-title":"Attention is not explanation","author":"Jain","year":"2017"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1166"},{"key":"ref65","first-page":"200","article-title":"Deep code comment generation","volume-title":"Proc. 26th Conf. Program Comprehension","author":"Hu"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"issue":"Jul","key":"ref67","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"Duchi","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref69","first-page":"314","article-title":"A parallel corpus of python functions and documentation strings for automated code documentation and code generation","author":"Barone"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09730-9"},{"key":"ref71","first-page":"65","article-title":"METEOR: An automatic metric for MT evaluation with improved correlation with human judgments","volume-title":"Proc. ACL Workshop Intrinsic Extrinsic Eval. Measures Mach. Transl. Summarization","volume":"29","author":"Banerjee"},{"key":"ref72","first-page":"1","article-title":"ROUGE: A package for automatic evaluation of summaries","author":"Lin","year":"2004","journal-title":"Proc. Workshop Text Summarization Branches Out"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1142"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w19-0309"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1492"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1153"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4009"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1064"},{"key":"ref79","article-title":"Neural machine translation in linear time","author":"Kalchbrenner","year":"2016"},{"key":"ref80","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","volume-title":"Proc. 27th Int. Conf. Neural Inf. Process. Syst.","author":"Sutskever"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-1019"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"ref84","article-title":"Gated graph sequence neural networks","author":"Li","year":"2015"},{"key":"ref85","first-page":"1093","article-title":"Learning program embeddings to propagate feedback on student code","author":"Piech","year":"2015"},{"key":"ref86","article-title":"Neuro-symbolic program synthesis","author":"Parisotto","year":"2016"},{"key":"ref87","first-page":"649","article-title":"Structured generative models of natural source code","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Maddison"},{"key":"ref88","first-page":"1","article-title":"A deep language model for software code","author":"Dam","year":"2016"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1057"},{"key":"ref90","first-page":"2123","article-title":"Bimodal modelling of source code and natural language","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Allamanis"},{"key":"ref91","first-page":"1","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2015"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240471"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238190"},{"key":"ref94","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","volume-title":"Proc. 12th Int. Conf. Neural Inf. Process. Syst.","author":"Sutton"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989381"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.128"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1127"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1062"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/9675297\/9031440-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9675297\/09031440.pdf?arnumber=9031440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:32:21Z","timestamp":1704839541000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9031440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":96,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2020.2979701","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}