{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:43:41Z","timestamp":1756572221176,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T00:00:00Z","timestamp":1547251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,12]]},"DOI":"10.1145\/3312662.3312710","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T16:30:09Z","timestamp":1555518609000},"page":"45-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["A Survey on Research of Code Comment"],"prefix":"10.1145","author":[{"given":"Bai","family":"Yang","sequence":"first","affiliation":[{"name":"College of Computer and Information Engineering, Inner Mongolia Normal University, Hohhot, China"}]},{"given":"Zhang","family":"Liping","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Inner Mongolia Normal University, Hohhot, China"}]},{"given":"Zhao","family":"Fengrong","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Inner Mongolia Normal University, Hohhot, China"}]}],"member":"320","published-online":{"date-parts":[[2019,1,12]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/ICPC.2013.6613836"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/32.6171"},{"issue":"12","key":"e_1_3_2_1_3_1","first-page":"3448","article-title":"Source code annotation quality assessment method based on combined classification algorithm{J}","volume":"36","author":"Hai LI","year":"2016","journal-title":"Journal of Computer Applications"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/WCRE.2007.21"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1858996.1859006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ICPC.2013.6613830"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/ICSM.1992.242525"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/MSR.2017.10"},{"volume-title":"International Conference on Program Comprehension. IEEE, 63--72","year":"2012","author":"Panichella S","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ICPC.2011.28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/ASE.2013.6693113"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2597008.2597149"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/WCRE.2010.13"},{"key":"e_1_3_2_1_14_1","first-page":"23","volume-title":"ICPC","author":"Laura Moreno","year":"2013"},{"unstructured":"Gail Cecile Murphy. 1996. Lightweight structural summarization as an aid to software evolution. PhD thesis.  Gail Cecile Murphy. 1996. Lightweight structural summarization as an aid to software evolution. PhD thesis.","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ICPC.2011.28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2568225.2568247"},{"unstructured":"Dana Movshovitz-Attias and William W Cohen. 2013. Natural language models for predicting programming comments.  Dana Movshovitz-Attias and William W Cohen. 2013. Natural language models for predicting programming comments.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_1_20_1","first-page":"2073","volume-title":"ACL","author":"Srinivasan Iyer","year":"2016"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.infsof.2006.10.017"},{"unstructured":"Sravani Punyamurthula. 2015. Dynamic model generation and semantic search for open source projects using big data analytics. PhD thesis Faculty of the University Of Missouri-Kansas City in partial fulfillment Of the requirements for the degree MASTER OF SCIENCE By SRAVANI PUNYAMURTHULA B. Tech Jawaharlal Nehru Technological University.  Sravani Punyamurthula. 2015. Dynamic model generation and semantic search for open source projects using big data analytics. PhD thesis Faculty of the University Of Missouri-Kansas City in partial fulfillment Of the requirements for the degree MASTER OF SCIENCE By SRAVANI PUNYAMURTHULA B. Tech Jawaharlal Nehru Technological University.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"crossref","unstructured":"Liang Y Zhu K Q. 2018. Automatic Generation of Text Descriptive Comments for Code Blocks{J}.  Liang Y Zhu K Q. 2018. Automatic Generation of Text Descriptive Comments for Code Blocks{J}.","key":"e_1_3_2_1_23_1","DOI":"10.1609\/aaai.v32i1.11963"},{"unstructured":"Liu Yihong et al. 2018. An Image Feature Extraction and Semantic Annotation Method Based on Visual Memory{J}. Computer Knowledge and Technology 2018(15).  Liu Yihong et al. 2018. An Image Feature Extraction and Semantic Annotation Method Based on Visual Memory{J}. Computer Knowledge and Technology 2018(15).","key":"e_1_3_2_1_24_1"},{"volume-title":"Computer Engineering and Science","year":"2018","author":"Qin Ming","key":"e_1_3_2_1_25_1"},{"unstructured":"Li Hongwei Peng Xin etal 2016. A code semantic annotation method based on domain ontology. Chinese scientific papers online. DOI= https:\/\/www.researchgate.net\/publication\/305526557.  Li Hongwei Peng Xin et al. 2016. A code semantic annotation method based on domain ontology. Chinese scientific papers online. DOI= https:\/\/www.researchgate.net\/publication\/305526557.","key":"e_1_3_2_1_26_1"},{"issue":"8","key":"e_1_3_2_1_27_1","first-page":"2226","article-title":"Code comment decision support methods that fuse structure and semantic features","volume":"29","author":"Huang Yuan","year":"2018","journal-title":"Journal of Software ISSN."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/SANER.2015.7081848"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/ASE.2011.6100145"},{"volume-title":"IEEE International Conference on Software Engineering. IEEE, 903--906","year":"2015","author":"Mcburney P W","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/1390630.1390664"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/ICST.2012.106"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/1323293.1294276"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/1985793.1985796"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/ESEM.2011.22"},{"volume-title":"Program Comprehension (ICPC), 2013 IEEE 21st International Conference on","author":"Steidl B.","first-page":"83","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/MSR.2017.63"},{"volume-title":"IEEE International Conference on Software Maintenance","year":"2007","author":"Deissenboeck F","key":"e_1_3_2_1_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/1368088.1368123"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.5555\/1894525.1894535"}],"event":{"sponsor":["China University of Geosciences"],"acronym":"ICMSS 2019","name":"ICMSS 2019: 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences","location":"Wuhan China"},"container-title":["Proceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312662.3312710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312662.3312710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:00Z","timestamp":1750208520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312662.3312710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,12]]},"references-count":40,"alternative-id":["10.1145\/3312662.3312710","10.1145\/3312662"],"URL":"https:\/\/doi.org\/10.1145\/3312662.3312710","relation":{},"subject":[],"published":{"date-parts":[[2019,1,12]]},"assertion":[{"value":"2019-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}