{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T05:12:34Z","timestamp":1768885954577,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-14-2-0242"],"award-info":[{"award-number":["FA8750-14-2-0242"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106253","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"727-739","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":138,"title":["Automatic inference of code transforms for patch generation"],"prefix":"10.1145","author":[{"given":"Fan","family":"Long","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Peter","family":"Amidon","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Spring Data REST. http:\/\/projects.spring.io\/spring-data-rest\/. (????).  Spring Data REST. http:\/\/projects.spring.io\/spring-data-rest\/. (????)."},{"key":"e_1_3_2_1_2_1","unstructured":"GitHub. https:\/\/github.com\/. (2008).  GitHub. https:\/\/github.com\/. (2008)."},{"key":"e_1_3_2_1_3_1","unstructured":"Mining and Understanding Software Enclaves (MUSE) Program. https:\/\/wiki. museprogram.org. (2016).  Mining and Understanding Software Enclaves (MUSE) Program. https:\/\/wiki. museprogram.org. (2016)."},{"key":"e_1_3_2_1_4_1","unstructured":"Activiti. http:\/\/activiti.org\/. (2017).  Activiti. http:\/\/activiti.org\/. (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"Apache maven. https:\/\/maven.apache.org\/. (2017).  Apache maven. https:\/\/maven.apache.org\/. (2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"Bukkit. https:\/\/bukkit.org. (2017).  Bukkit. https:\/\/bukkit.org. (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"Dataflow Java SDK. https:\/\/github.com\/GoogleCloudPlatform\/DataflowJavaSDK. (2017).  Dataflow Java SDK. https:\/\/github.com\/GoogleCloudPlatform\/DataflowJavaSDK. (2017)."},{"key":"e_1_3_2_1_8_1","unstructured":"dyn.js. http:\/\/dynjs.org\/. (2017).  dyn.js. http:\/\/dynjs.org\/. (2017)."},{"key":"e_1_3_2_1_9_1","unstructured":"Error Prone. http:\/\/errorprone.info\/. (2017).  Error Prone. http:\/\/errorprone.info\/. (2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"Hamcrest Bean. https:\/\/github.com\/eXparity\/hamcrest-bean. (2017).  Hamcrest Bean. https:\/\/github.com\/eXparity\/hamcrest-bean. (2017)."},{"key":"e_1_3_2_1_11_1","unstructured":"HdrHistogram. https:\/\/github.com\/HdrHistogram\/HdrHistogram. (2017).  HdrHistogram. https:\/\/github.com\/HdrHistogram\/HdrHistogram. (2017)."},{"key":"e_1_3_2_1_12_1","unstructured":"HikariCP. https:\/\/brettwooldridge.github.io\/HikariCP\/. (2017).  HikariCP. https:\/\/brettwooldridge.github.io\/HikariCP\/. (2017)."},{"key":"e_1_3_2_1_13_1","unstructured":"Html Elements framework. https:\/\/github.com\/yandex-qatools\/htmlelements. (2017).  Html Elements framework. https:\/\/github.com\/yandex-qatools\/htmlelements. (2017)."},{"key":"e_1_3_2_1_14_1","unstructured":"jade4j. https:\/\/github.com\/neuland\/jade4j. (2017).  jade4j. https:\/\/github.com\/neuland\/jade4j. (2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"Javaslang. http:\/\/www.javaslang.io\/. (2017).  Javaslang. http:\/\/www.javaslang.io\/. (2017)."},{"key":"e_1_3_2_1_16_1","unstructured":"JGit - Eclipse. https:\/\/eclipse.org\/jgit\/. (2017).  JGit - Eclipse. https:\/\/eclipse.org\/jgit\/. (2017)."},{"key":"e_1_3_2_1_17_1","unstructured":"Joda-Time. http:\/\/www.joda.org\/joda-time\/. (2017).  Joda-Time. http:\/\/www.joda.org\/joda-time\/. (2017)."},{"key":"e_1_3_2_1_18_1","unstructured":"jPOS. http:\/\/www.jpos.org\/. (2017).  jPOS. http:\/\/www.jpos.org\/. (2017)."},{"key":"e_1_3_2_1_19_1","unstructured":"JUnit. http:\/\/junit.org\/. (2017).  JUnit. http:\/\/junit.org\/. (2017)."},{"key":"e_1_3_2_1_20_1","unstructured":"MapStruct - Java Bean Mappings the Easy Way! http:\/\/mapstruct.org\/. (2017).  MapStruct - Java Bean Mappings the Easy Way! http:\/\/mapstruct.org\/. (2017)."},{"key":"e_1_3_2_1_21_1","unstructured":"OrientDB. http:\/\/orientdb.com\/orientdb\/. (2017).  OrientDB. http:\/\/orientdb.com\/orientdb\/. (2017)."},{"key":"e_1_3_2_1_22_1","unstructured":"Simple Intelligent Object Mapping. http:\/\/modelmapper.org\/. (2017).  Simple Intelligent Object Mapping. http:\/\/modelmapper.org\/. (2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771796"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 33rd International Conference on Machine Learning.","author":"Bielik Pavol","year":"2016","unstructured":"Pavol Bielik , Veselin Vechev , and Martin Vechev . 2016 . PHOG: Prababilistic Model for Code . In Proceedings of the 33rd International Conference on Machine Learning. Pavol Bielik, Veselin Vechev, and Martin Vechev. 2016. PHOG: Prababilistic Model for Code. In Proceedings of the 33rd International Conference on Machine Learning."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_3_2_1_26_1","volume-title":"Qlose: Program Repair with Quantitative Objectives. In Computer-Aided Verification (CAV).","author":"D\u2019Antoni Loris","year":"2016","unstructured":"Loris D\u2019Antoni , Roopsha Samanta , and Rishabh Singh . 2016 . Qlose: Program Repair with Quantitative Objectives. In Computer-Aided Verification (CAV). Loris D\u2019Antoni, Roopsha Samanta, and Rishabh Singh. 2016. Qlose: Program Repair with Quantitative Objectives. In Computer-Aided Verification (CAV)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593735.2593740"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.122"},{"key":"e_1_3_2_1_30_1","volume-title":"Automatic Repair of Real Bugs: An Experience Report on the Defects4J Dataset. CoRR abs\/1505.07002","author":"Durieux Thomas","year":"2015","unstructured":"Thomas Durieux , Matias Martinez , Martin Monperrus , Romain Sommerard , and Jifeng Xuan . 2015. Automatic Repair of Real Bugs: An Experience Report on the Defects4J Dataset. CoRR abs\/1505.07002 ( 2015 ). http:\/\/arxiv.org\/abs\/1505.07002 Thomas Durieux, Matias Martinez, Martin Monperrus, Romain Sommerard, and Jifeng Xuan. 2015. Automatic Repair of Real Bugs: An Experience Report on the Defects4J Dataset. CoRR abs\/1505.07002 (2015). http:\/\/arxiv.org\/abs\/1505.07002"},{"key":"e_1_3_2_1_31_1","unstructured":"Inc. Gurobi Optimization. Gurobi Optimizer Reference Manual. (2015). http: \/\/www.gurobi.com  Inc. Gurobi Optimization. Gurobi Optimizer Reference Manual. (2015). http: \/\/www.gurobi.com"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_12"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486893"},{"key":"e_1_3_2_1_34_1","volume-title":"History Driven Program Repair. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016","author":"Le Xuan-Bach D.","year":"2016","unstructured":"Xuan-Bach D. Le , David Lo , and Claire Le Goues . 2016 . History Driven Program Repair. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016 , Suita, Osaka, Japan , March 14-18, 2016. 213\u2013224. Xuan-Bach D. Le, David Lo, and Claire Le Goues. 2016. History Driven Program Repair. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016, Suita, Osaka, Japan, March 14-18, 2016. 213\u2013224."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786811"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884872"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 37th International Conference on Software Engineering -","volume":"1","author":"Meng Na","year":"1875","unstructured":"Na Meng , Lisa Hua , Miryung Kim , and Kathryn S . McKinley. 2015. Does Automated Refactoring Obviate Systematic Editing? . In Proceedings of the 37th International Conference on Software Engineering - Volume 1 (ICSE \u201915\u2019). IEEE Press, Piscataway, NJ, USA, 392\u2013402. http:\/\/dl.acm.org\/citation.cfm?id=28 1875 4.2818804 Na Meng, Lisa Hua, Miryung Kim, and Kathryn S. McKinley. 2015. Does Automated Refactoring Obviate Systematic Editing?. In Proceedings of the 37th International Conference on Software Engineering - Volume 1 (ICSE \u201915\u2019). IEEE Press, Piscataway, NJ, USA, 392\u2013402. http:\/\/dl.acm.org\/citation.cfm?id=2818754.2818804"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993537"},{"key":"e_1_3_2_1_43_1","volume-title":"35th International Conference on Software Engineering, ICSE \u201913","author":"Meng Na","year":"2013","unstructured":"Na Meng , Miryung Kim , and Kathryn S . McKinley. 2013. LASE: locating and applying systematic edits by learning from examples . In 35th International Conference on Software Engineering, ICSE \u201913 , San Francisco, CA, USA , May 18-26, 2013 . 502\u2013511. Na Meng, Miryung Kim, and Kathryn S. McKinley. 2013. LASE: locating and applying systematic edits by learning from examples. In 35th International Conference on Software Engineering, ICSE \u201913, San Francisco, CA, USA, May 18-26, 2013. 502\u2013511."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568324"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913\u2019). IEEE Press","author":"Thien Nguyen Hoang Duong","year":"2013","unstructured":"Hoang Duong Thien Nguyen , Dawei Qi , Abhik Roychoudhury , and Satish Chandra . 2013 . SemFix: Program Repair via Semantic Analysis . In Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913\u2019). IEEE Press , Piscataway, NJ, USA, 772\u2013781. http:\/\/dl.acm.org\/citation.cfm?id=2486788.2486890 Hoang Duong Thien Nguyen, Dawei Qi, Abhik Roychoudhury, and Satish Chandra. 2013. SemFix: Program Repair via Semantic Analysis. In Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913\u2019). IEEE Press, Piscataway, NJ, USA, 772\u2013781. http:\/\/dl.acm.org\/citation.cfm?id=2486788.2486890"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2346"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837671"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_1_53_1","volume-title":"Beebee","author":"Rinard Martin","year":"2004","unstructured":"Martin Rinard , Cristian Cadar , Daniel Dumitran , Daniel M. Roy , Tudor Leu , and William S . Beebee . 2004 . Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI. 303\u2013316. Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee. 2004. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI. 303\u2013316."},{"key":"e_1_3_2_1_54_1","volume-title":"Learning Syntactic Program Transformations from Examples. (Aug","author":"Rolim Reudismam","year":"2016","unstructured":"Reudismam Rolim , Gustavo Soares , Loris D\u2019Antoni , Oleksandr Polozov , Sumit Gulwani , Rohit Gheyi , Ryo Suzuki , and Bjoern Hartmann . Learning Syntactic Program Transformations from Examples. (Aug . 2016 ). arXiv:arXiv:1608.09000 Reudismam Rolim, Gustavo Soares, Loris D\u2019Antoni, Oleksandr Polozov, Sumit Gulwani, Rohit Gheyi, Ryo Suzuki, and Bjoern Hartmann. Learning Syntactic Program Transformations from Examples. (Aug. 2016). arXiv:arXiv:1608.09000"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.44"},{"key":"e_1_3_2_1_56_1","volume-title":"ICSE 2012","author":"Samimi Hesam","year":"2012","unstructured":"Hesam Samimi , Max Sch\u00e4fer , Shay Artzi , Todd D. Millstein , Frank Tip , and Laurie J. Hendren . 2012. Automated repair of HTML generation errors in PHP applications using string constraint solving . In ICSE 2012 , June 2-9, 2012 , Zurich, Switzerland. 277\u2013287. Automatic Inference of Code Transforms for Patch Generation ESEC\/FSE\u201917, September 4-8 , 2017, Paderborn, Germany Hesam Samimi, Max Sch\u00e4fer, Shay Artzi, Todd D. Millstein, Frank Tip, and Laurie J. Hendren. 2012. Automated repair of HTML generation errors in PHP applications using string constraint solving. In ICSE 2012, June 2-9, 2012, Zurich, Switzerland. 277\u2013287. Automatic Inference of Code Transforms for Patch Generation ESEC\/FSE\u201917, September 4-8, 2017, Paderborn, Germany"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106269"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048146"},{"key":"e_1_3_2_1_60_1","unstructured":"Sooel Son Kathryn S McKinley and Vitaly Shmatikov. 2013. Fix Me Up: Repairing Access-Control Bugs in Web Applications.. In NDSS.  Sooel Son Kathryn S McKinley and Vitaly Shmatikov. 2013. Fix Me Up: Repairing Access-Control Bugs in Web Applications.. In NDSS."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany","acronym":"ESEC\/FSE'17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106253","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:36Z","timestamp":1750217436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":62,"alternative-id":["10.1145\/3106237.3106253","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106253","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}