{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:17:27Z","timestamp":1773843447083,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3211346.3211349","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:49:37Z","timestamp":1528400977000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Ariadne: analysis for machine learning programs"],"prefix":"10.1145","author":[{"given":"Julian","family":"Dolby","sequence":"first","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Avraham","family":"Shinnar","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Allison","family":"Allain","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Jenna","family":"Reinen","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1999. Refactoring: Improving the Design of Existing Code. AddisonWesley Longman Publishing Co. Inc. Boston MA USA.   1999. Refactoring: Improving the Design of Existing Code. AddisonWesley Longman Publishing Co. Inc. Boston MA USA."},{"key":"e_1_3_2_1_2_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dandelion Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. (2015). https:\/\/www.tensorflow.org\/ Software available from tensorflow.org.  Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dandelion Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. (2015). https:\/\/www.tensorflow.org\/ Software available from tensorflow.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Miltiadis Allamanis Earl T. Barr Premkumar T. Devanbu and Charles A. Sutton. 2017. A Survey of Machine Learning for Big Code and Naturalness. CoRR abs\/1709.06182 (2017).  Miltiadis Allamanis Earl T. Barr Premkumar T. Devanbu and Charles A. Sutton. 2017. A Survey of Machine Learning for Big Code and Naturalness. CoRR abs\/1709.06182 (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"AppScan {n. d.}. IBM Security AppScan. https:\/\/www.ibm.com\/ security\/application-security\/appscan . ({n. d.}). Accessed: 2018-02-28.  AppScan {n. d.}. IBM Security AppScan. https:\/\/www.ibm.com\/ security\/application-security\/appscan . ({n. d.}). Accessed: 2018-02-28."},{"key":"e_1_3_2_1_5_1","unstructured":"Figure 7. Excerpt of TensorFlow model in WALA. This ex-  Figure 7. Excerpt of TensorFlow model in WALA. This ex-"},{"key":"e_1_3_2_1_6_1","unstructured":"Figure 8. Excerpt of Tensorflow model in WALA. The func-  Figure 8. Excerpt of Tensorflow model in WALA. The func-"},{"key":"e_1_3_2_1_7_1","unstructured":"IR so this portion of the model describes the functions  IR so this portion of the model describes the functions"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136000.3136001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27937-9_15"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486887"},{"key":"e_1_3_2_1_13_1","unstructured":"Flake8 {n. d.}. Flake8. https:\/\/github.com\/PyCQA\/flake8 . ({n. d.}). Accessed: 2018-03-08.  Flake8 {n. d.}. Flake8. https:\/\/github.com\/PyCQA\/flake8 . ({n. d.}). Accessed: 2018-03-08."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001442"},{"key":"e_1_3_2_1_15_1","unstructured":"JavaScript share {n. d.}. Usage of client-side programming languages for websites. https:\/\/w3techs.com\/technologies\/overview\/client_side_ language\/all . ({n. d.}). Accessed: 3-7-2018.  JavaScript share {n. d.}. Usage of client-side programming languages for websites. https:\/\/w3techs.com\/technologies\/overview\/client_side_ language\/all . ({n. d.}). Accessed: 3-7-2018."},{"key":"e_1_3_2_1_16_1","unstructured":"Melvin Johnson Mike Schuster Quoc V. Le Maxim Krikun Yonghui Wu Zhifeng Chen Nikhil Thorat Fernanda B. Vi\u00e9gas Martin Wattenberg Greg Corrado Macduff Hughes and Jeffrey Dean. 2016. Google\u2019s Multilingual Neural Machine Translation System: Enabling Zero-Shot Translation. CoRR abs\/1611.04558 (2016). arXiv: 1611.04558 http:\/\/arxiv.org\/abs\/1611.04558  Melvin Johnson Mike Schuster Quoc V. Le Maxim Krikun Yonghui Wu Zhifeng Chen Nikhil Thorat Fernanda B. Vi\u00e9gas Martin Wattenberg Greg Corrado Macduff Hughes and Jeffrey Dean. 2016. Google\u2019s Multilingual Neural Machine Translation System: Enabling Zero-Shot Translation. CoRR abs\/1611.04558 (2016). arXiv: 1611.04558 http:\/\/arxiv.org\/abs\/1611.04558"},{"key":"e_1_3_2_1_17_1","volume-title":"2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","volume":"00","author":"Ko Y."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 2012 International Workshop on Foundations of Object-Oriented Languages. ACM.","author":"Lee H."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970368"},{"key":"e_1_3_2_1_20_1","unstructured":"MNIST {n. d.}. The MNIST Database of handwritten digits. http: \/\/yann.lecun.com\/exdb\/mnist\/ . ({n. d.}). Accessed: 2018-03-08.  MNIST {n. d.}. The MNIST Database of handwritten digits. http: \/\/yann.lecun.com\/exdb\/mnist\/ . ({n. d.}). Accessed: 2018-03-08."},{"key":"e_1_3_2_1_21_1","unstructured":"MNIST example {n. d.}. MNIST example code. https: \/\/github.com\/aymericdamien\/TensorFlow-Examples\/blob\/ dd2e6dcd9603d5de008d8c766453162d0204affa\/examples\/3_ NeuralNetworks\/convolutional_network.py . ({n. d.}). Accessed: 2018-03-08.  MNIST example {n. d.}. MNIST example code. https: \/\/github.com\/aymericdamien\/TensorFlow-Examples\/blob\/ dd2e6dcd9603d5de008d8c766453162d0204affa\/examples\/3_ NeuralNetworks\/convolutional_network.py . ({n. d.}). Accessed: 2018-03-08."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conb.2008.07.006"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2344089"},{"key":"e_1_3_2_1_24_1","unstructured":"Prospector {n. d.}. Prospector. https:\/\/prospector.landscape.io\/en\/ master\/index.html . ({n. d.}). Accessed: 2018-02-28.  Prospector {n. d.}. Prospector. https:\/\/prospector.landscape.io\/en\/ master\/index.html . ({n. d.}). Accessed: 2018-02-28."},{"key":"e_1_3_2_1_25_1","unstructured":"PyChecker {n. d.}. PyChecker. http:\/\/pychecker.sourceforge.net\/ . ({n. d.}). Accessed: 2018-03-08.  PyChecker {n. d.}. PyChecker. http:\/\/pychecker.sourceforge.net\/ . ({n. d.}). Accessed: 2018-03-08."},{"key":"e_1_3_2_1_26_1","unstructured":"Pylint {n. d.}. Pylint. http:\/\/www.pylint.org\/ . ({n. d.}). Accessed: 2018-02-28.  Pylint {n. d.}. Pylint. http:\/\/www.pylint.org\/ . ({n. d.}). Accessed: 2018-02-28."},{"key":"e_1_3_2_1_27_1","unstructured":"Python Call Graphs {n. d.}. Python Call Graphs. http:\/\/pycallgraph. slowchop.com\/en\/master\/ . ({n. d.}). Accessed: 2018-02-28.  Python Call Graphs {n. d.}. Python Call Graphs. http:\/\/pycallgraph. slowchop.com\/en\/master\/ . ({n. d.}). Accessed: 2018-02-28."},{"key":"e_1_3_2_1_28_1","unstructured":"Python Taint {n. d.}. Python Taint. https:\/\/github.com\/ python-security\/pyt . ({n. d.}). Accessed: 2018-02-28.  Python Taint {n. d.}. Python Taint. https:\/\/github.com\/ python-security\/pyt . ({n. d.}). Accessed: 2018-02-28."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Jenna M. Reinen Oliver Y. Che\u00cc\u0104n R. Matthew Hutchison B.T. Thomas Yeo Kevin M. Anderson Mert R. Sabuncu Dost O\u00cc\u0139ngu\u00cc\u0139r Joshua L. Roffman Jordan W. Smoller Justin T. Baker and Avram J. Holmes. 2018. The human cortex possesses a reconfigurable dynamic network architecture that is disrupted in psychosis. Nature Communications In Press (2018).  Jenna M. Reinen Oliver Y. Che\u00cc\u0104n R. Matthew Hutchison B.T. Thomas Yeo Kevin M. Anderson Mert R. Sabuncu Dost O\u00cc\u0139ngu\u00cc\u0139r Joshua L. Roffman Jordan W. Smoller Justin T. Baker and Avram J. Holmes. 2018. The human cortex possesses a reconfigurable dynamic network architecture that is disrupted in psychosis. Nature Communications In Press (2018).","DOI":"10.1038\/s41467-018-03462-y"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048145"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31057-7_20"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsych.2009.07.019"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMoa1204471"},{"key":"e_1_3_2_1_35_1","unstructured":"WALA {n. d.}. Watson Libraries for Analysis. https:\/\/github.com\/wala\/ WALA . ({n. d.}). Accessed: 2018-02-28.  WALA {n. d.}. Watson Libraries for Analysis. https:\/\/github.com\/wala\/ WALA . ({n. d.}). Accessed: 2018-02-28."}],"event":{"name":"PLDI '18: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Philadelphia PA USA","acronym":"PLDI '18","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3211346.3211349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3211346.3211349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:14Z","timestamp":1750208894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3211346.3211349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":34,"alternative-id":["10.1145\/3211346.3211349","10.1145\/3211346"],"URL":"https:\/\/doi.org\/10.1145\/3211346.3211349","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}