{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:05:43Z","timestamp":1770282343162,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314591","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"269-285","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Using active learning to synthesize models of applications that access databases"],"prefix":"10.1145","author":[{"given":"Jiasi","family":"Shen","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Martin C.","family":"Rinard","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2018. Enki. https:\/\/github.com\/xaviershay\/enki .  2018. Enki. https:\/\/github.com\/xaviershay\/enki ."},{"key":"e_1_3_2_2_2_1","unstructured":"2018. Fulcrum. https:\/\/github.com\/fulcrum-agile\/fulcrum .  2018. Fulcrum. https:\/\/github.com\/fulcrum-agile\/fulcrum ."},{"key":"e_1_3_2_2_3_1","unstructured":"2018. Getting Started with Rails. http:\/\/guides.rubyonrails.org\/getting_ started.html .  2018. Getting Started with Rails. http:\/\/guides.rubyonrails.org\/getting_ started.html ."},{"key":"e_1_3_2_2_4_1","unstructured":"2018. Kandan \u2013 Modern Open Source Chat. https:\/\/github.com\/ kandanapp\/kandan .  2018. Kandan \u2013 Modern Open Source Chat. https:\/\/github.com\/ kandanapp\/kandan ."},{"key":"e_1_3_2_2_5_1","volume-title":"PLDI 2019 Konure Code. http:\/\/people.csail.mit.edu\/jiasi\/ pldi2019","year":"2019","unstructured":"2019. PLDI 2019 Konure Code. http:\/\/people.csail.mit.edu\/jiasi\/ pldi2019 .code\/ and https:\/\/people.csail.mit.edu\/rinard\/paper\/pldi 2019 . code\/ . 2019. PLDI 2019 Konure Code. http:\/\/people.csail.mit.edu\/jiasi\/ pldi2019.code\/ and https:\/\/people.csail.mit.edu\/rinard\/paper\/pldi2019. code\/ ."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.60"},{"key":"e_1_3_2_2_7_1","volume-title":"Learning I\/O Automata","author":"Aarts Fides","unstructured":"Fides Aarts and Frits Vaandrager . 2010. Learning I\/O Automata . Springer Berlin Heidelberg , Berlin, Heidelberg , 71\u201385. Fides Aarts and Frits Vaandrager. 2010. Learning I\/O Automata. Springer Berlin Heidelberg, Berlin, Heidelberg, 71\u201385."},{"key":"e_1_3_2_2_8_1","volume-title":"2009 11th IEEE International Symposium on Web Systems Evolution. 141\u2013150","author":"Alalfi M. H.","unstructured":"M. H. Alalfi , J. R. Cordy , and T. R. Dean . 2009. WAFA: Fine-grained dynamic analysis of web applications . In 2009 11th IEEE International Symposium on Web Systems Evolution. 141\u2013150 . M. H. Alalfi, J. R. Cordy, and T. R. Dean. 2009. WAFA: Fine-grained dynamic analysis of web applications. In 2009 11th IEEE International Symposium on Web Systems Evolution. 141\u2013150."},{"key":"e_1_3_2_2_9_1","volume-title":"FM-CAD 2013","author":"Alur Rajeev","year":"2013","unstructured":"Rajeev Alur , Rastislav Bod\u00edk , Garvit Juniwal , Milo M. K. Martin , Mukund Raghothaman , Sanjit A. Seshia , Rishabh Singh , Armando Solar-Lezama , Emina Torlak , and Abhishek Udupa . 2013 . Syntaxguided synthesis. In Formal Methods in Computer-Aided Design , FM-CAD 2013 , Portland, OR, USA , October 20-23, 2013. 1\u20138. Rajeev Alur, Rastislav Bod\u00edk, Garvit Juniwal, Milo M. K. Martin, Mukund Raghothaman, Sanjit A. Seshia, Rishabh Singh, Armando Solar-Lezama, Emina Torlak, and Abhishek Udupa. 2013. Syntaxguided synthesis. In Formal Methods in Computer-Aided Design, FM-CAD 2013, Portland, OR, USA, October 20-23, 2013. 1\u20138."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/356914.356918"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315249"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442529"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062349"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192383"},{"key":"e_1_3_2_2_16_1","volume-title":"VSTTE 2015","author":"Beyene Tewodros A.","year":"2015","unstructured":"Tewodros A. Beyene , Swarat Chaudhuri , Corneliu Popeea , and Andrey Rybalchenko . 2015 . Recursive Games for Compositional Program Synthesis. In Verified Software: Theories, Tools, and Experiments - 7th International Conference , VSTTE 2015 , San Francisco, CA, USA , July 18-19, 2015. Revised Selected Papers. 19\u201339. Tewodros A. Beyene, Swarat Chaudhuri, Corneliu Popeea, and Andrey Rybalchenko. 2015. Recursive Games for Compositional Program Synthesis. In Verified Software: Theories, Tools, and Experiments - 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Revised Selected Papers. 19\u201339."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698754"},{"key":"e_1_3_2_2_18_1","volume-title":"The calculus of computation: decision procedures with applications to verification","author":"Bradley Aaron R","unstructured":"Aaron R Bradley and Zohar Manna . 2007. The calculus of computation: decision procedures with applications to verification . Springer Science & amp; Business Media. Aaron R Bradley and Zohar Manna. 2007. The calculus of computation: decision procedures with applications to verification. Springer Science &amp; Business Media."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-016-0355-5"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462180"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231496"},{"key":"e_1_3_2_2_23_1","volume-title":"Cosette: An Automated Prover for SQL. In CIDR","author":"Chu Shumo","year":"2017","unstructured":"Shumo Chu , Chenglong Wang , Konstantin Weitz , and Alvin Cheung . 2017 . Cosette: An Automated Prover for SQL. In CIDR 2017, 8th Biennial Conference on Innovative Data Systems Research, Chaminade, CA, USA, January 8-11, 2017, Online Proceedings . http:\/\/cidrdb.org\/cidr2017\/ papers\/p51-chu-cidr17.pdf Shumo Chu, Chenglong Wang, Konstantin Weitz, and Alvin Cheung. 2017. Cosette: An Automated Prover for SQL. In CIDR 2017, 8th Biennial Conference on Innovative Data Systems Research, Chaminade, CA, USA, January 8-11, 2017, Online Proceedings. http:\/\/cidrdb.org\/cidr2017\/ papers\/p51-chu-cidr17.pdf"},{"key":"e_1_3_2_2_24_1","volume-title":"Generative and Transformational Techniques in Software","author":"Cleve Anthony","unstructured":"Anthony Cleve , Nesrine Noughi , and Jean-Luc Hainaut . 2013. Dynamic program analysis for database reverse engineering . In Generative and Transformational Techniques in Software Engineering IV. Springer , 297\u2013 321. Anthony Cleve, Nesrine Noughi, and Jean-Luc Hainaut. 2013. Dynamic program analysis for database reverse engineering. In Generative and Transformational Techniques in Software Engineering IV. Springer, 297\u2013 321."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/958961.958962"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.28"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/832307.837102"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915)","author":"Ruiter Joeri De","year":"2015","unstructured":"Joeri De Ruiter and Erik Poll . 2015 . Protocol State Fuzzing of TLS Implementations . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915) . USENIX Association, Berkeley, CA, USA, 193\u2013206. Joeri De Ruiter and Erik Poll. 2015. Protocol State Fuzzing of TLS Implementations. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915). USENIX Association, Berkeley, CA, USA, 193\u2013206."},{"key":"e_1_3_2_2_29_1","volume-title":"Sampling for Bayesian Program Learning. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016","author":"Ellis Kevin","year":"2016","unstructured":"Kevin Ellis , Armando Solar-Lezama , and Josh Tenenbaum . 2016 . Sampling for Bayesian Program Learning. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016 , December 5-10, 2016, Barcelona, Spain. 1289\u2013 1297. Kevin Ellis, Armando Solar-Lezama, and Josh Tenenbaum. 2016. Sampling for Bayesian Program Learning. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain. 1289\u2013 1297."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192382"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062351"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737977"},{"key":"e_1_3_2_2_33_1","volume-title":"Combining Model Learning and Model Checking to Analyze TCP Implementations","author":"Fiter\u0103u-Bro\u015ftean Paul","unstructured":"Paul Fiter\u0103u-Bro\u015ftean , Ramon Janssen , and Frits Vaandrager . 2016. Combining Model Learning and Model Checking to Analyze TCP Implementations . Springer International Publishing , Cham , 454\u2013471. Paul Fiter\u0103u-Bro\u015ftean, Ramon Janssen, and Frits Vaandrager. 2016. Combining Model Learning and Model Checking to Analyze TCP Implementations. Springer International Publishing, Cham, 454\u2013471."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.43"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"e_1_3_2_2_36_1","volume-title":"CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 307\u2013323","author":"Gehr Timon","unstructured":"Timon Gehr , Dimitar Dimitrov , and Martin T. Vechev . 2015. Learning Commutativity Specifications. In Computer Aided Verification - 27th International Conference , CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 307\u2013323 . Timon Gehr, Dimitar Dimitrov, and Martin T. Vechev. 2015. Learning Commutativity Specifications. In Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 307\u2013323."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.07.008"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1561\/2500000010"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447862"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546750"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786875"},{"key":"e_1_3_2_2_45_1","volume-title":"The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning","author":"Isberner Malte","unstructured":"Malte Isberner , Falk Howar , and Bernhard Steffen . 2014. The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning . Springer International Publishing , Cham , 307\u2013322. Malte Isberner, Falk Howar, and Bernhard Steffen. 2014. The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning. Springer International Publishing, Cham, 307\u2013322."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884856"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803189"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"e_1_3_2_2_50_1","volume-title":"Lam","author":"Benjamin Livshits V.","year":"2005","unstructured":"V. Benjamin Livshits and Monica S . Lam . 2005 . Finding Security Vulnerabilities in Java Applications with Static Analysis (SSYM\u2019 05). 18\u201318. V. Benjamin Livshits and Monica S. Lam. 2005. Finding Security Vulnerabilities in Java Applications with Static Analysis (SSYM\u201905). 18\u201318."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337233"},{"key":"e_1_3_2_2_52_1","volume-title":"Gedanken-experiments on sequential machines. Automata studies 34","author":"Moore Edward F","year":"1956","unstructured":"Edward F Moore . 1956. Gedanken-experiments on sequential machines. Automata studies 34 ( 1956 ), 129\u2013153. Edward F Moore. 1956. Gedanken-experiments on sequential machines. Automata studies 34 (1956), 129\u2013153."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597790"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594297"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_3"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908093"},{"key":"e_1_3_2_2_57_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"80","author":"Pu Yewen","year":"2018","unstructured":"Yewen Pu , Zachery Miranda , Armando Solar-Lezama , and Leslie Kaelbling . 2018 . Selecting Representative Examples for Program Synthesis . In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research) , Vol. 80 . PMLR, 4161\u20134170. http:\/\/proceedings.mlr.press\/v80\/pu18b.html Yewen Pu, Zachery Miranda, Armando Solar-Lezama, and Leslie Kaelbling. 2018. Selecting Representative Examples for Program Synthesis. In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Vol. 80. PMLR, 4161\u20134170. http:\/\/proceedings.mlr.press\/v80\/pu18b.html"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180232"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081180.1081189"},{"key":"e_1_3_2_2_60_1","volume-title":"Database Programming with JDBC and JAVA. O\u2019Reilly Media","author":"Reese George","unstructured":"George Reese . 2000. Database Programming with JDBC and JAVA. O\u2019Reilly Media , Inc . George Reese. 2000. Database Programming with JDBC and JAVA. O\u2019Reilly Media, Inc."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297072"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276954.3276959"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694389"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168907"},{"key":"e_1_3_2_2_68_1","volume-title":"TesMa and CATG: Automated Test Generation Tools for Models of Enterprise Applications. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering","volume":"2","author":"Tanno H.","unstructured":"H. Tanno , X. Zhang , T. Hoshino , and K. Sen . 2015 . TesMa and CATG: Automated Test Generation Tools for Models of Enterprise Applications. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering , Vol. 2 . 717\u2013720. H. Tanno, X. Zhang, T. Hoshino, and K. Sen. 2015. TesMa and CATG: Automated Test Generation Tools for Models of Enterprise Applications. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, Vol. 2. 717\u2013720."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967606"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10373-5_3"},{"key":"e_1_3_2_2_71_1","volume-title":"Qex: Symbolic SQL Query Explorer. In Logic for Programming, Artificial Intelligence, and Reasoning, Edmund M","author":"Veanes Margus","year":"2010","unstructured":"Margus Veanes , Nikolai Tillmann , and Jonathan de Halleux . 2010 . Qex: Symbolic SQL Query Explorer. In Logic for Programming, Artificial Intelligence, and Reasoning, Edmund M . Clarke and Andrei Voronkov (Eds.). Springer Berlin Heidelberg, Berlin , Heidelberg , 425\u2013446. Margus Veanes, Nikolai Tillmann, and Jonathan de Halleux. 2010. Qex: Symbolic SQL Query Explorer. In Logic for Programming, Artificial Intelligence, and Reasoning, Edmund M. Clarke and Andrei Voronkov (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 425\u2013446."},{"key":"e_1_3_2_2_72_1","volume-title":"Approximate Active Learning of Nondeterministic Input Output Transition Systems. Electronic Communications of the EASST 72","author":"Volpato Michele","year":"2015","unstructured":"Michele Volpato and Jan Tretmans . 2015. Approximate Active Learning of Nondeterministic Input Output Transition Systems. Electronic Communications of the EASST 72 ( 2015 ). Michele Volpato and Jan Tretmans. 2015. Approximate Active Learning of Nondeterministic Input Output Transition Systems. Electronic Communications of the EASST 72 (2015)."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062365"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276527"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158151"},{"key":"e_1_3_2_2_76_1","volume-title":"Mysql Reference Manual","author":"Widenius Michael","unstructured":"Michael Widenius and Davis Axmark . 2002. Mysql Reference Manual ( 1 st ed.). O\u2019Reilly & amp; Associates, Inc., Sebastopol, CA, USA. Michael Widenius and Davis Axmark. 2002. Mysql Reference Manual (1st ed.). O\u2019Reilly &amp; Associates, Inc., Sebastopol, CA, USA.","edition":"1"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005754"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908088"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177735"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133887"},{"key":"e_1_3_2_2_81_1","volume-title":"Proceedings of the 26th International Conference on Software Engineering (ICSE \u201904)","author":"Yan Hong","year":"2004","unstructured":"Hong Yan , David Garlan , Bradley Schmerl , Jonathan Aldrich , and Rick Kazman . 2004 . DiscoTect: A System for Discovering Architectures from Running Systems . In Proceedings of the 26th International Conference on Software Engineering (ICSE \u201904) . IEEE Computer Society, Washington, DC, USA, 470\u2013479. Hong Yan, David Garlan, Bradley Schmerl, Jonathan Aldrich, and Rick Kazman. 2004. DiscoTect: A System for Discovering Architectures from Running Systems. In Proceedings of the 26th International Conference on Software Engineering (ICSE \u201904). IEEE Computer Society, Washington, DC, USA, 470\u2013479."}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Phoenix AZ USA","acronym":"PLDI '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":79,"alternative-id":["10.1145\/3314221.3314591","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314591","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}