{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:10:17Z","timestamp":1767093017309,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568292","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"664-675","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":108,"title":["Spotting working code examples"],"prefix":"10.1145","author":[{"given":"Iman","family":"Keivanloo","sequence":"first","affiliation":[{"name":"Queen's University, Canada"}]},{"given":"Juergen","family":"Rilling","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Ying","family":"Zou","sequence":"additional","affiliation":[{"name":"Queen's University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287630"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882316"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9144-6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167115"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753402"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1074"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133905.1133907"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"volume-title":"Proceedings of the International Conference on Software Engineering. 782-792","author":"Buse R. P.","key":"e_1_3_2_1_10_1","unstructured":"Buse , R. P. , and Weimer , W . 2012. Synthesizing API usage examples . In Proceedings of the International Conference on Software Engineering. 782-792 . Buse, R. P., and Weimer, W. 2012. Synthesizing API usage examples. In Proceedings of the International Conference on Software Engineering. 782-792."},{"volume-title":"Proceedings of International Workshop on Applications of Neural Networks to Telecommunications, 273-287","author":"Carter S.","key":"e_1_3_2_1_11_1","unstructured":"Carter , S. , Frank , R. J. , and Tansley , D. S. W. 1993. Clone detection in telecommunications software systems: A neural net approach . In Proceedings of International Workshop on Applications of Neural Networks to Telecommunications, 273-287 . Carter, S., Frank, R. J., and Tansley, D. S. W. 1993. Clone detection in telecommunications software systems: A neural net approach. In Proceedings of International Workshop on Applications of Neural Networks to Telecommunications, 273-287."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00593-0_26"},{"key":"e_1_3_2_1_13_1","volume-title":"Regular expression matching with a trigram index or how Google code search worked. Online resource: http:\/\/swtch.com\/~rsc\/regexp\/regexp4.html (January","author":"Cox R.","year":"2012","unstructured":"Cox , R. 2012. Regular expression matching with a trigram index or how Google code search worked. Online resource: http:\/\/swtch.com\/~rsc\/regexp\/regexp4.html (January 2012 ). Cox, R. 2012. Regular expression matching with a trigram index or how Google code search worked. Online resource: http:\/\/swtch.com\/~rsc\/regexp\/regexp4.html (January 2012)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUITE.2009.5070022"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081744"},{"volume-title":"Proceedings of International Conference on Software Maintenance. 555-558","author":"Holmes R.","key":"e_1_3_2_1_16_1","unstructured":"Holmes , R. , Cottrell , R. , Walker , R. J. , and Denzinger , J . 2009. The end-to-end use of source code examples: An exploratory study . In Proceedings of International Conference on Software Maintenance. 555-558 . Holmes, R., Cottrell, R., Walker, R. J., and Denzinger, J. 2009. The end-to-end use of source code examples: An exploratory study. In Proceedings of International Conference on Software Maintenance. 555-558."},{"volume-title":"Proceedings of the International Conference on Software Engineering. 331-341","author":"Inoue K.","key":"e_1_3_2_1_17_1","unstructured":"Inoue , K. , Sasaki , Y. , Xia , P. , and Manabe , Y . 2012. Where does this code come from and where does it go? - integrated code history tracker for open source systems . In Proceedings of the International Conference on Software Engineering. 331-341 . Inoue, K., Sasaki, Y., Xia, P., and Manabe, Y. 2012. Where does this code come from and where does it go? - integrated code history tracker for open source systems. In Proceedings of the International Conference on Software Engineering. 331-341."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/141936.141943"},{"volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence. 1358- 1363","author":"Kim J.","key":"e_1_3_2_1_19_1","unstructured":"Kim , J. , Lee , S. , Hwang , S. W. , and Kim , S . 2010. Towards an intelligent code search engine . In Proceedings of the AAAI Conference on Artificial Intelligence. 1358- 1363 . Kim, J., Lee, S., Hwang, S. W., and Kim, S. 2010. Towards an intelligent code search engine. In Proceedings of the AAAI Conference on Artificial Intelligence. 1358- 1363."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.37"},{"key":"e_1_3_2_1_21_1","unstructured":"Lopes C. Bajracharya S. Ossher J. Baldi P. 2010. UCI source code data sets. http:\/\/www.ics.uci.edu\/~lopes\/datasets. Irvine CA: University of California Bren School of Information and Computer Sciences.  Lopes C. Bajracharya S. Ossher J. Baldi P. 2010. UCI source code data sets. http:\/\/www.ics.uci.edu\/~lopes\/datasets. Irvine CA: University of California Bren School of Information and Computer Sciences."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985809"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Manning C. D. Raghavan P. and Sch\u00fctze H. 2008. Introduction to information retrieval. Cambridge University Press.   Manning C. D. Raghavan P. and Sch\u00fctze H. 2008. Introduction to information retrieval. Cambridge University Press.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUITE.2009.5070018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384689"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/584955.584976"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985429.1985438"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.193"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.161"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070525"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167508"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026562"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853305"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321663"},{"volume-title":"Proceedings of Working Conference on Mining Software Repositories, 319-328","author":"Wang J.","key":"e_1_3_2_1_37_1","unstructured":"Wang , J. , Yingnong , D. , Hongyu , Z. , Kai , C. , Xie , T. , and Dongmei , Z . 2013. Mining succinct and high-coverage API usage patterns from source code . In Proceedings of Working Conference on Mining Software Repositories, 319-328 . Wang, J., Yingnong, D., Hongyu, Z., Kai, C., Xie, T., and Dongmei, Z. 2013. Mining succinct and high-coverage API usage patterns from source code. In Proceedings of Working Conference on Mining Software Repositories, 319-328."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1137997"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:30Z","timestamp":1750234230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":38,"alternative-id":["10.1145\/2568225.2568292","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568292","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}