{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:19:55Z","timestamp":1770977995766,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3211346.3211355","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:49:37Z","timestamp":1528400977000},"page":"69-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["The three pillars of machine programming"],"prefix":"10.1145","author":[{"given":"Justin","family":"Gottschlich","sequence":"first","affiliation":[{"name":"Intel Labs, USA"}]},{"given":"Armando","family":"Solar-Lezama","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Nesime","family":"Tatbul","sequence":"additional","affiliation":[{"name":"Intel Labs, USA \/ Massachusetts Institute of Technology, USA"}]},{"given":"Michael","family":"Carbin","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Regina","family":"Barzilay","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Saman","family":"Amarasinghe","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Joshua B.","family":"Tenenbaum","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Tim","family":"Mattson","sequence":"additional","affiliation":[{"name":"Intel Labs, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.39"},{"key":"e_1_3_2_1_3_1","volume-title":"CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. 934\u2013950","author":"Albarghouthi Aws","year":"2013","unstructured":"Aws Albarghouthi , Sumit Gulwani , and Zachary Kincaid . 2013 . Recursive Program Synthesis. In Computer Aided Verification - 25th International Conference , CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. 934\u2013950 . Aws Albarghouthi, Sumit Gulwani, and Zachary Kincaid. 2013. Recursive Program Synthesis. In Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. 934\u2013950."},{"key":"e_1_3_2_1_4_1","unstructured":"Rajeev Alur Rastislav Bod\u00edk Eric Dallal Dana Fisman Pranav Garg Garvit Juniwal Hadas Kress-Gazit P. Madhusudan Milo M. K. Martin Mukund Raghothaman Shambwaditya Saha Sanjit A. Seshia Rishabh Singh Armando Solar-Lezama Emina Torlak and Abhishek Udupa. 2015. Syntax-Guided Synthesis. In Dependable Software Systems Engineering. 1\u201325.  Rajeev Alur Rastislav Bod\u00edk Eric Dallal Dana Fisman Pranav Garg Garvit Juniwal Hadas Kress-Gazit P. Madhusudan Milo M. K. Martin Mukund Raghothaman Shambwaditya Saha Sanjit A. Seshia Rishabh Singh Armando Solar-Lezama Emina Torlak and Abhishek Udupa. 2015. Syntax-Guided Synthesis. In Dependable Software Systems Engineering. 1\u201325."},{"key":"e_1_3_2_1_5_1","volume-title":"CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part II. 163\u2013179","author":"Alur Rajeev","year":"2015","unstructured":"Rajeev Alur , Pavol Cern\u00fd , and Arjun Radhakrishna . 2015 . Synthesis Through Unification. In Computer Aided Verification - 27th International Conference , CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part II. 163\u2013179 . Rajeev Alur, Pavol Cern\u00fd, and Arjun Radhakrishna. 2015. Synthesis Through Unification. In Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part II. 163\u2013179."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542481"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628071.2628092"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455567.1455599"},{"key":"e_1_3_2_1_9_1","volume-title":"DeepCoder: Learning to Write Programs. ICLR","author":"Balog Matej","year":"2017","unstructured":"Matej Balog , Alexander L. Gaunt , Marc Brockschmidt , Sebastian Nowozin , and Daniel Tarlow . 2017. DeepCoder: Learning to Write Programs. ICLR ( 2017 ). https:\/\/arxiv.org\/abs\/1611.01989 Matej Balog, Alexander L. Gaunt, Marc Brockschmidt, Sebastian Nowozin, and Daniel Tarlow. 2017. DeepCoder: Learning to Write Programs. ICLR (2017). https:\/\/arxiv.org\/abs\/1611.01989"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771796"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442529"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/762761.762818"},{"key":"e_1_3_2_1_13_1","volume-title":"AI Programmer: Autonomously Creating Software Programs Using Genetic Algorithms. CoRR abs\/1709.05703","author":"Becker Kory","year":"2017","unstructured":"Kory Becker and Justin Gottschlich . 2017. AI Programmer: Autonomously Creating Software Programs Using Genetic Algorithms. CoRR abs\/1709.05703 ( 2017 ). arXiv: 1709.05703 http:\/\/arxiv.org\/abs\/ 1709.05703 Kory Becker and Justin Gottschlich. 2017. AI Programmer: Autonomously Creating Software Programs Using Genetic Algorithms. CoRR abs\/1709.05703 (2017). arXiv: 1709.05703 http:\/\/arxiv.org\/abs\/ 1709.05703"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 33nd International Conference on Machine Learning, ICML 2016","author":"Bielik Pavol","year":"2016","unstructured":"Pavol Bielik , Veselin Raychev , and Martin T. Vechev . 2016. PHOG: Probabilistic Model for Code . In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016 , New York City, NY, USA , June 19-24, 2016 . 2933\u20132942. http:\/\/jmlr.org\/proceedings\/papers\/v48\/ bielik16.html Pavol Bielik, Veselin Raychev, and Martin T. Vechev. 2016. PHOG: Probabilistic Model for Code. In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016. 2933\u20132942. http:\/\/jmlr.org\/proceedings\/papers\/v48\/ bielik16.html"},{"key":"e_1_3_2_1_15_1","volume-title":"Making Neural Programming Architectures Generalize via Recursion. CoRR abs\/1704.06611","author":"Cai Jonathon","year":"2017","unstructured":"Jonathon Cai , Richard Shin , and Dawn Song . 2017. Making Neural Programming Architectures Generalize via Recursion. CoRR abs\/1704.06611 ( 2017 ). arXiv: 1704.06611 http:\/\/arxiv.org\/abs\/1704. 06611 Jonathon Cai, Richard Shin, and Dawn Song. 2017. Making Neural Programming Architectures Generalize via Recursion. CoRR abs\/1704.06611 (2017). arXiv: 1704.06611 http:\/\/arxiv.org\/abs\/1704. 06611"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806629"},{"key":"e_1_3_2_1_18_1","volume-title":"Towards Synthesizing Complex Programs from Input-Output Examples. CoRR abs\/1706.01284","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen , Chang Liu , and Dawn Song . 2017. Towards Synthesizing Complex Programs from Input-Output Examples. CoRR abs\/1706.01284 ( 2017 ). arXiv: 1706.01284 http:\/\/arxiv.org\/abs\/1706.01284 Xinyun Chen, Chang Liu, and Dawn Song. 2017. Towards Synthesizing Complex Programs from Input-Output Examples. CoRR abs\/1706.01284 (2017). arXiv: 1706.01284 http:\/\/arxiv.org\/abs\/1706.01284"},{"key":"e_1_3_2_1_19_1","volume-title":"Tree-to-tree Neural Networks for Program Translation. CoRR abs\/1712.01208","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen , Chang Liu , and Dawn Song . 2017. Tree-to-tree Neural Networks for Program Translation. CoRR abs\/1712.01208 ( 2017 ). https: \/\/arxiv.org\/abs\/1712.01208 Xinyun Chen, Chang Liu, and Dawn Song. 2017. Tree-to-tree Neural Networks for Program Translation. CoRR abs\/1712.01208 (2017). https: \/\/arxiv.org\/abs\/1712.01208"},{"key":"e_1_3_2_1_20_1","unstructured":"Allen Cypher Daniel C. Halbert David Kurlander Henry Lieberman David Maulsby Brad A. Myers and Alan Turransky (Eds.). 1993. Watch What I Do: Programming by Demonstration. MIT Press Cambridge MA USA.   Allen Cypher Daniel C. Halbert David Kurlander Henry Lieberman David Maulsby Brad A. Myers and Alan Turransky (Eds.). 1993. Watch What I Do: Programming by Demonstration. MIT Press Cambridge MA USA."},{"key":"e_1_3_2_1_21_1","volume-title":"Qlose: Program Repair with Quantitative Objectives. In Computer-Aided Verification (CAV).","author":"D\u2019Antoni Loris","year":"2016","unstructured":"Loris D\u2019Antoni , Roopsha Samanta , and Rishabh Singh . 2016 . Qlose: Program Repair with Quantitative Objectives. In Computer-Aided Verification (CAV). Loris D\u2019Antoni, Roopsha Samanta, and Rishabh Singh. 2016. Qlose: Program Repair with Quantitative Objectives. In Computer-Aided Verification (CAV)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677006"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.840848"},{"key":"e_1_3_2_1_24_1","volume-title":"Automatic Repair of Real Bugs: An Experience Report on the Defects4J Dataset. CoRR abs\/1505.07002","author":"Durieux Thomas","year":"2015","unstructured":"Thomas Durieux , Matias Martinez , Martin Monperrus , Romain Sommerard , and Jifeng Xuan . 2015. Automatic Repair of Real Bugs: An Experience Report on the Defects4J Dataset. CoRR abs\/1505.07002 ( 2015 ). http:\/\/arxiv.org\/abs\/1505.07002 Thomas Durieux, Matias Martinez, Martin Monperrus, Romain Sommerard, and Jifeng Xuan. 2015. Automatic Repair of Real Bugs: An Experience Report on the Defects4J Dataset. CoRR abs\/1505.07002 (2015). http:\/\/arxiv.org\/abs\/1505.07002"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172115"},{"key":"e_1_3_2_1_26_1","volume-title":"Tenenbaum","author":"Ellis Kevin","year":"2017","unstructured":"Kevin Ellis , Daniel Ritchie , Armando Solar-Lezama , and Joshua B . Tenenbaum . 2017 . Learning to Infer Graphics Programs from HandDrawn Images. CoRR abs\/1707.09627 (2017). arXiv: 1707.09627 http: \/\/arxiv.org\/abs\/1707.09627 Kevin Ellis, Daniel Ritchie, Armando Solar-Lezama, and Joshua B. Tenenbaum. 2017. Learning to Infer Graphics Programs from HandDrawn Images. CoRR abs\/1707.09627 (2017). arXiv: 1707.09627 http: \/\/arxiv.org\/abs\/1707.09627"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000108"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737977"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP \u201998","author":"Frigo Matteo","year":"1998","unstructured":"Matteo Frigo and Steven G. Johnson . 1998. FFTW: an adaptive software architecture for the FFT . In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP \u201998 , Seattle, Washington, USA , May 12-15, 1998 . 1381\u20131384. Matteo Frigo and Steven G. Johnson. 1998. FFTW: an adaptive software architecture for the FFT. In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP \u201998, Seattle, Washington, USA, May 12-15, 1998. 1381\u20131384."},{"key":"e_1_3_2_1_30_1","volume-title":"TerpreT: A Probabilistic Programming Language for Program Induction. CoRR abs\/1608.04428","author":"Gaunt Alexander L.","year":"2016","unstructured":"Alexander L. Gaunt , Marc Brockschmidt , Rishabh Singh , Nate Kushman , Pushmeet Kohli , Jonathan Taylor , and Daniel Tarlow . 2016. TerpreT: A Probabilistic Programming Language for Program Induction. CoRR abs\/1608.04428 ( 2016 ). arXiv: 1608.04428 http:\/\/arxiv.org\/abs\/ 1608.04428 Alexander L. Gaunt, Marc Brockschmidt, Rishabh Singh, Nate Kushman, Pushmeet Kohli, Jonathan Taylor, and Daniel Tarlow. 2016. TerpreT: A Probabilistic Programming Language for Program Induction. CoRR abs\/1608.04428 (2016). arXiv: 1608.04428 http:\/\/arxiv.org\/abs\/ 1608.04428"},{"key":"e_1_3_2_1_31_1","volume-title":"Neural Turing Machines. CoRR abs\/1410.5401","author":"Graves Alex","year":"2014","unstructured":"Alex Graves , Greg Wayne , and Ivo Danihelka . 2014. Neural Turing Machines. CoRR abs\/1410.5401 ( 2014 ). arXiv: 1410.5401 http:\/\/arxiv. org\/abs\/1410.5401 Alex Graves, Greg Wayne, and Ivo Danihelka. 2014. Neural Turing Machines. CoRR abs\/1410.5401 (2014). arXiv: 1410.5401 http:\/\/arxiv. org\/abs\/1410.5401"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926423"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993506"},{"key":"e_1_3_2_1_34_1","volume-title":"Bordeaux","author":"Inala Jeevana Priya","year":"2016","unstructured":"Jeevana Priya Inala , Rohit Singh , and Armando Solar-Lezama . 2016 . Synthesis of Domain Specific CNF Encoders for Bit-Vector Solvers. In Theory and Applications of Satisfiability Testing - SAT 2016 - 19th International Conference , Bordeaux , France, July 5-8, 2016, Proceedings. 302\u2013320. Jeevana Priya Inala, Rohit Singh, and Armando Solar-Lezama. 2016. Synthesis of Domain Specific CNF Encoders for Bit-Vector Solvers. In Theory and Applications of Satisfiability Testing - SAT 2016 - 19th International Conference, Bordeaux, France, July 5-8, 2016, Proceedings. 302\u2013320."},{"key":"e_1_3_2_1_35_1","series-title":"Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, ACL","volume-title":"Long Papers. 963\u2013973.","author":"Iyer Srinivasan","year":"2017","unstructured":"Srinivasan Iyer , Ioannis Konstas , Alvin Cheung , Jayant Krishnamurthy , and Luke Zettlemoyer . 2017. Learning a Neural Semantic Parser from User Feedback . In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, ACL 2017 , Vancouver, Canada, July 30 - August 4, Volume 1 : Long Papers. 963\u2013973. Srinivasan Iyer, Ioannis Konstas, Alvin Cheung, Jayant Krishnamurthy, and Luke Zettlemoyer. 2017. Learning a Neural Semantic Parser from User Feedback. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, ACL 2017, Vancouver, Canada, July 30 - August 4, Volume 1: Long Papers. 963\u2013973."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908117"},{"key":"e_1_3_2_1_37_1","volume-title":"Jeffrey Dean, and Neoklis Polyzotis.","author":"Kraska Tim","year":"2017","unstructured":"Tim Kraska , Alex Beutel , Ed H. Chi , Jeffrey Dean, and Neoklis Polyzotis. 2017 . The Case for Learned Index Structures. CoRR abs\/1712.01208 (2017). https:\/\/arxiv.org\/abs\/1712.01208 Tim Kraska, Alex Beutel, Ed H. Chi, Jeffrey Dean, and Neoklis Polyzotis. 2017. The Case for Learned Index Structures. CoRR abs\/1712.01208 (2017). https:\/\/arxiv.org\/abs\/1712.01208"},{"key":"e_1_3_2_1_38_1","volume-title":"History Driven Program Repair. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016","author":"Le Xuan-Bach D.","year":"2016","unstructured":"Xuan-Bach D. Le , David Lo , and Claire Le Goues . 2016 . History Driven Program Repair. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016 , Suita, Osaka, Japan , March 14-18, 2016. 213\u2013224. Xuan-Bach D. Le, David Lo, and Claire Le Goues. 2016. History Driven Program Repair. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016, Suita, Osaka, Japan, March 14-18, 2016. 213\u2013224."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, ACL 2013","volume":"1303","author":"Lei Tao","year":"2013","unstructured":"Tao Lei , Fan Long , Regina Barzilay , and Martin C. Rinard . 2013. From Natural Language Specifications to Program Input Parsers . In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, ACL 2013 , 4-9 August 2013 , Sofia, Bulgaria , Volume 1: Long Papers. 1294\u2013 1303 . Tao Lei, Fan Long, Regina Barzilay, and Martin C. Rinard. 2013. From Natural Language Specifications to Program Input Parsers. In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, ACL 2013, 4-9 August 2013, Sofia, Bulgaria, Volume 1: Long Papers. 1294\u20131303."},{"key":"e_1_3_2_1_40_1","volume-title":"Learning to Optimize. ICLR","author":"Li Ke Li","year":"2017","unstructured":"Ke Li Li and Jitendra Malik . 2017. Learning to Optimize. ICLR ( 2017 ). https:\/\/arxiv.org\/abs\/1606.01885 Ke Li Li and Jitendra Malik. 2017. Learning to Optimize. ICLR (2017). https:\/\/arxiv.org\/abs\/1606.01885"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786811"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133908"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993537"},{"key":"e_1_3_2_1_47_1","volume-title":"35th International Conference on Software Engineering, ICSE \u201913","author":"Meng Na","year":"2013","unstructured":"Na Meng , Miryung Kim , and Kathryn S . McKinley. 2013. LASE: locating and applying systematic edits by learning from examples . In 35th International Conference on Software Engineering, ICSE \u201913 , San Francisco, CA, USA , May 18-26, 2013 . 502\u2013511. Na Meng, Miryung Kim, and Kathryn S. McKinley. 2013. LASE: locating and applying systematic edits by learning from examples. In 35th International Conference on Software Engineering, ICSE \u201913, San Francisco, CA, USA, May 18-26, 2013. 502\u2013511."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384689"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037089"},{"key":"e_1_3_2_1_50_1","volume-title":"Bayesian Sketch Learning for Program Synthesis. CoRR abs\/1703.05698","author":"Murali Vijayaraghavan","year":"2017","unstructured":"Vijayaraghavan Murali , Swarat Chaudhuri , and Chris Jermaine . 2017. Bayesian Sketch Learning for Program Synthesis. CoRR abs\/1703.05698 ( 2017 ). arXiv: 1703.05698 http:\/\/arxiv.org\/abs\/1703.05698 Vijayaraghavan Murali, Swarat Chaudhuri, and Chris Jermaine. 2017. Bayesian Sketch Learning for Program Synthesis. CoRR abs\/1703.05698 (2017). arXiv: 1703.05698 http:\/\/arxiv.org\/abs\/1703.05698"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913\u2019). IEEE Press","author":"Thien Nguyen Hoang Duong","year":"2013","unstructured":"Hoang Duong Thien Nguyen , Dawei Qi , Abhik Roychoudhury , and Satish Chandra . 2013 . SemFix: Program Repair via Semantic Analysis . In Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913\u2019). IEEE Press , Piscataway, NJ, USA, 772\u2013781. http:\/\/dl.acm.org\/citation.cfm?id=2486788.2486890 Hoang Duong Thien Nguyen, Dawei Qi, Abhik Roychoudhury, and Satish Chandra. 2013. SemFix: Program Repair via Semantic Analysis. In Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913\u2019). IEEE Press, Piscataway, NJ, USA, 772\u2013781. http:\/\/dl.acm.org\/citation.cfm?id=2486788.2486890"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2738007"},{"key":"e_1_3_2_1_53_1","volume-title":"SAS 2013, Seattle, WA, USA, June 20-22, 2013. Proceedings. 63\u201383","author":"Peleg Hila","year":"2013","unstructured":"Hila Peleg , Sharon Shoham , Eran Yahav , and Hongseok Yang . 2013 . Symbolic Automata for Static Specification Mining. In Static Analysis -20th International Symposium , SAS 2013, Seattle, WA, USA, June 20-22, 2013. Proceedings. 63\u201383 . Hila Peleg, Sharon Shoham, Eran Yahav, and Hongseok Yang. 2013. Symbolic Automata for Static Specification Mining. In Static Analysis -20th International Symposium, SAS 2013, Seattle, WA, USA, June 20-22, 2013. Proceedings. 63\u201383."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594297"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594339"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908093"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814310"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342004041291"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462176"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_1_63_1","volume-title":"Technical Report. Department of Computer Science","author":"Babble Labble Chris Re.","unstructured":"Chris Re. 2017. Babble Labble . Technical Report. Department of Computer Science , Stanford , Stanford, CA . https:\/\/hazyresearch.github.io\/ snorkel\/blog\/babble_labble.html Chris Re. 2017. Babble Labble. Technical Report. Department of Computer Science, Stanford, Stanford, CA. https:\/\/hazyresearch.github.io\/ snorkel\/blog\/babble_labble.html"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.86782"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.44"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694389"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106269"},{"key":"e_1_3_2_1_69_1","volume-title":"CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 398\u2013414","author":"Singh Rishabh","year":"2015","unstructured":"Rishabh Singh and Sumit Gulwani . 2015 . Predicting a Correct Program in Programming by Example. In Computer Aided Verification - 27th International Conference , CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 398\u2013414 . Rishabh Singh and Sumit Gulwani. 2015. Predicting a Correct Program in Programming by Example. In Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 398\u2013414."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025153"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_58"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168907"},{"key":"e_1_3_2_1_73_1","unstructured":"Sooel Son Kathryn S McKinley and Vitaly Shmatikov. 2013. Fix Me Up: Repairing Access-Control Bugs in Web Applications.. In NDSS.  Sooel Son Kathryn S McKinley and Vitaly Shmatikov. 2013. Fix Me Up: Repairing Access-Control Bugs in Web Applications.. In NDSS."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706337"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462174"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1561\/2500000028"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375598"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_1_79_1","volume-title":"Proceedings of the ACM\/IEEE Conference on Supercomputing, SC 1998","author":"Clinton Whaley R.","year":"1998","unstructured":"R. Clinton Whaley and Jack J. Dongarra . 1998. Automatically Tuned Linear Algebra Software . In Proceedings of the ACM\/IEEE Conference on Supercomputing, SC 1998 , November 7-13, 1998 , Orlando, FL, USA. 38. R. Clinton Whaley and Jack J. Dongarra. 1998. Automatically Tuned Linear Algebra Software. In Proceedings of the ACM\/IEEE Conference on Supercomputing, SC 1998, November 7-13, 1998, Orlando, FL, USA. 38."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"e_1_3_2_1_81_1","volume-title":"SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning. CoRR abs\/1711.04436","author":"Xu Xiaojun","year":"2017","unstructured":"Xiaojun Xu , Chang Liu , and Dawn Song . 2017. SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning. CoRR abs\/1711.04436 ( 2017 ). arXiv: 1711.04436 http:\/\/arxiv. org\/abs\/1711.04436 Xiaojun Xu, Chang Liu, and Dawn Song. 2017. SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning. CoRR abs\/1711.04436 (2017). arXiv: 1711.04436 http:\/\/arxiv. org\/abs\/1711.04436"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2986012.2986021"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133887"},{"key":"e_1_3_2_1_84_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez , and Ion Stoica . 2017 . Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017 , Boston, MA, USA , March 27-29, 2017. 283\u2013298. https:\/\/www.usenix. org\/conference\/nsdi17\/technical-sessions\/presentation\/zheng Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017. 283\u2013298. https:\/\/www.usenix. org\/conference\/nsdi17\/technical-sessions\/presentation\/zheng"}],"event":{"name":"PLDI '18: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Philadelphia PA USA","acronym":"PLDI '18","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3211346.3211355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3211346.3211355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:14Z","timestamp":1750208894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3211346.3211355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":83,"alternative-id":["10.1145\/3211346.3211355","10.1145\/3211346"],"URL":"https:\/\/doi.org\/10.1145\/3211346.3211355","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}