{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:18:49Z","timestamp":1770275929943,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011199","name":"European Research Council","doi-asserted-by":"publisher","award":["680358"],"award-info":[{"award-number":["680358"]}],"id":[{"id":"10.13039\/100011199","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314640","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"745-759","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Unsupervised learning of API aliasing specifications"],"prefix":"10.1145","author":[{"given":"Jan","family":"Eberhardt","sequence":"first","affiliation":[{"name":"DeepCode, Switzerland"}]},{"given":"Samuel","family":"Steffen","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]},{"given":"Veselin","family":"Raychev","sequence":"additional","affiliation":[{"name":"DeepCode, Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Miltiadis Allamanis Marc Brockschmidt and Mahmoud Khademi. 2017. Learning to Represent Programs with Graphs. CoRR abs\/1711.00740  Miltiadis Allamanis Marc Brockschmidt and Mahmoud Khademi. 2017. Learning to Represent Programs with Graphs. CoRR abs\/1711.00740"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"e_1_3_2_2_4_1","first-page":"03","article-title":"epicode. https:\/\/github.com\/adnanaziz\/epicode\/ blob\/884568f491146065472fafc32923e8aa73dd8076\/java\/src\/main\/ java\/com\/epi\/MergeSortedArrays.java#L38","volume":"27","author":"Aziz Adnan","year":"2016","unstructured":"Adnan Aziz . 2016 . epicode. https:\/\/github.com\/adnanaziz\/epicode\/ blob\/884568f491146065472fafc32923e8aa73dd8076\/java\/src\/main\/ java\/com\/epi\/MergeSortedArrays.java#L38 . Accessed : 27 . 03 .2019. Adnan Aziz. 2016. epicode. https:\/\/github.com\/adnanaziz\/epicode\/ blob\/884568f491146065472fafc32923e8aa73dd8076\/java\/src\/main\/ java\/com\/epi\/MergeSortedArrays.java#L38 . Accessed: 27.03.2019.","journal-title":"Accessed"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676977"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192383"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993524"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978422"},{"key":"e_1_3_2_2_9_1","first-page":"03","article-title":"Flask-Admin. https:\/\/github.com\/flask-admin\/ flask-admin\/commit\/f447db0c78c03235d0dd6bdce0c5365fc6a7c321","volume":"27","author":"Brown Paul","year":"2015","unstructured":"Paul Brown . 2015 . Flask-Admin. https:\/\/github.com\/flask-admin\/ flask-admin\/commit\/f447db0c78c03235d0dd6bdce0c5365fc6a7c321 . Accessed : 27 . 03 .2019. Paul Brown. 2015. Flask-Admin. https:\/\/github.com\/flask-admin\/ flask-admin\/commit\/f447db0c78c03235d0dd6bdce0c5365fc6a7c321 . Accessed: 27.03.2019.","journal-title":"Accessed"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771810"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236059"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993565"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236085"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884856"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI \u201906)","author":"Kremenek Ted","year":"2006","unstructured":"Ted Kremenek , Paul Twohey , Godmar Back , Andrew Ng , and Dawson Engler . 2006 . From Uncertainty to Belief: Inferring the Specification Within . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI \u201906) . USENIX Association, Berkeley, CA, USA, 161\u2013176. http:\/\/dl.acm.org\/citation.cfm?id=1298455.1298471 Ted Kremenek, Paul Twohey, Godmar Back, Andrew Ng, and Dawson Engler. 2006. From Uncertainty to Belief: Inferring the Specification Within. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI \u201906). USENIX Association, Berkeley, CA, USA, 161\u2013176. http:\/\/dl.acm.org\/citation.cfm?id=1298455.1298471"},{"key":"e_1_3_2_2_16_1","volume-title":"Lyu","author":"Li Jian","year":"2017","unstructured":"Jian Li , Yue Wang , Irwin King , and Michael R . Lyu . 2017 . Code Completion with Neural Attention and Pointer Networks. CoRR abs\/1711.09573 (2017). arXiv: 1711.09573 http:\/\/arxiv.org\/abs\/1711. 09573 Jian Li, Yue Wang, Irwin King, and Michael R. Lyu. 2017. Code Completion with Neural Attention and Pointer Networks. CoRR abs\/1711.09573 (2017). arXiv: 1711.09573 http:\/\/arxiv.org\/abs\/1711. 09573"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542485"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 14th Conference on USENIX Security Symposium -","volume":"14","author":"Benjamin Livshits V.","unstructured":"V. Benjamin Livshits and Monica S. Lam . 2005. Finding Security Vulnerabilities in Java Applications with Static Analysis . In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 (SSYM\u201905). USENIX Association, Berkeley, CA, USA, 18\u201318. http: \/\/dl.acm.org\/citation.cfm?id=1251398.1251416 V. Benjamin Livshits and Monica S. Lam. 2005. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 (SSYM\u201905). USENIX Association, Berkeley, CA, USA, 18\u201318. http: \/\/dl.acm.org\/citation.cfm?id=1251398.1251416"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566213"},{"key":"e_1_3_2_2_20_1","volume-title":"11th International Symposium, SAS 2004, Verona, Italy, August 26-28, 2004, Proceedings. 165\u2013180","author":"Nystrom Erik M.","unstructured":"Erik M. Nystrom , Hong-Seok Kim , and Wen-mei W. Hwu . 2004. Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis. In Static Analysis , 11th International Symposium, SAS 2004, Verona, Italy, August 26-28, 2004, Proceedings. 165\u2013180 . Erik M. Nystrom, Hong-Seok Kim, and Wen-mei W. Hwu. 2004. Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis. In Static Analysis, 11th International Symposium, SAS 2004, Verona, Italy, August 26-28, 2004, Proceedings. 165\u2013180."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984043.2989222"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250749"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 10th International Conference on Compiler Construction (CC \u201901)","author":"Rountev Atanas","unstructured":"Atanas Rountev and Barbara G. Ryder . 2001. Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries . In Proceedings of the 10th International Conference on Compiler Construction (CC \u201901) . Springer-Verlag, London, UK, UK, 20\u201336. http:\/\/dl.acm.org\/citation. cfm?id=647477.727784 Atanas Rountev and Barbara G. Ryder. 2001. Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries. In Proceedings of the 10th International Conference on Compiler Construction (CC \u201901). Springer-Verlag, London, UK, UK, 20\u201336. http:\/\/dl.acm.org\/citation. cfm?id=647477.727784"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292552"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273487"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009885"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1561\/2500000014"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31057-7_20"},{"key":"e_1_3_2_2_32_1","volume-title":"Evaluating Design Tradeoffs in Numeric Static Analysis for Java. In ESOP","author":"Wei Shiyi","year":"2018","unstructured":"Shiyi Wei , Piotr Mardziel , Andrew Ruef , Jeffrey S. Foster , and Michael Hicks . 2018 . Evaluating Design Tradeoffs in Numeric Static Analysis for Java. In ESOP 2018. 653\u2013682. Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, and Michael Hicks. 2018. Evaluating Design Tradeoffs in Numeric Static Analysis for Java. In ESOP 2018. 653\u2013682."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134325"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03542-0_21"}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Phoenix AZ USA","acronym":"PLDI '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:29Z","timestamp":1750204409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":33,"alternative-id":["10.1145\/3314221.3314640","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314640","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}