{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:41:54Z","timestamp":1762324914178,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB1004805"],"award-info":[{"award-number":["2018YFB1004805"]}]},{"name":"National Natural Science Foundation of China","award":["61702024, 61932007, 61972013, 61421003"],"award-info":[{"award-number":["61702024, 61932007, 61972013, 61421003"]}]},{"name":"ARC","award":["DP200102940"],"award-info":[{"award-number":["DP200102940"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416568","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"29-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Learning to handle exceptions"],"prefix":"10.1145","author":[{"given":"Jian","family":"Zhang","sequence":"first","affiliation":[{"name":"Beihang University, China"}]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Newcastle, Australia"}]},{"given":"Hailong","family":"Sun","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]},{"given":"Yanjun","family":"Pu","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]},{"given":"Xudong","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2786805.2786849"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/3192366.3192412"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/TSE.2018.2827384"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2901739.2903500"},{"key":"e_1_3_2_1_5_1","volume-title":"3rd International Conference on Learning Representations, ICLR","author":"Bahdanau Dzmitry","year":"2015","unstructured":"Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2015. Neural machine translation by jointly learning to align and translate. In 3rd International Conference on Learning Representations, ICLR 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/TSE.2017.2716925"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/TSE.2015.2506164"},{"key":"e_1_3_2_1_8_1","first-page":"1137","article-title":"A neural probabilistic language model","author":"Bengio Yoshua","year":"2003","unstructured":"Yoshua Bengio, R\u00e9jean Ducharme, Pascal Vincent, and Christian Jauvin. 2003. A neural probabilistic language model. Journal of machine learning research 3, Feb (2003), 1137--1155.","journal-title":"Journal of machine learning research 3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/ICNN.1993.298725"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-540-73589-2_8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/ASE.2008.59"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ICSME.2014.25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2568225.2568308"},{"unstructured":"Rich Caruana Steve Lawrence and C Lee Giles. 2001. Overfitting in neural nets: Backpropagation conjugate gradient and early stopping. In Advances in neural information processing systems. 402--408.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/j.jss.2008.06.035"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. 2181--2191","author":"Chen Lingzhen","year":"2018","unstructured":"Lingzhen Chen and Alessandro Moschitti. 2018. Learning to Progressively Recognize New Named Entities with Sequence to Sequence Models. In Proceedings of the 27th International Conference on Computational Linguistics. 2181--2191."},{"key":"e_1_3_2_1_17_1","volume-title":"Michele Tufano, Louis-No\u00ebl Pouchet, Denys Poshyvanyk, and Martin Monperrus.","author":"Chen Zimin","year":"2019","unstructured":"Zimin Chen, Steve James Kommrusch, Michele Tufano, Louis-No\u00ebl Pouchet, Denys Poshyvanyk, and Martin Monperrus. 2019. Sequencer: Sequence-to-sequence learning for end-to-end program repair. IEEE Transactions on Software Engineering (2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-3-540-70592-5_10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/3196398.3196435"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2786805.2786877"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/S0164-1212(01)00062-0"},{"volume-title":"The Java language specification","author":"Gosling James","unstructured":"James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. 2000. The Java language specification. Addison-Wesley Professional.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3180155.3180167"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2950290.2950334"},{"volume-title":"Addison-Wesley Longman Publishing Co","author":"Hejlsberg Anders","unstructured":"Anders Hejlsberg, Scott Wiltamuth, and Peter Golde. 2003. C# language specification. Addison-Wesley Longman Publishing Co., Inc.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/3106237.3106290"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.5555\/2337223.2337322"},{"key":"e_1_3_2_1_28_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_29_1","volume-title":"Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991 (2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.18653\/v1\/P16-1195"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.18653\/v1\/D18-1192"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/2901739.2903497"},{"key":"e_1_3_2_1_33_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1162\/tacl_a_00101"},{"key":"e_1_3_2_1_35_1","first-page":"207","article-title":"Fuzzy sets and fuzzy logic: theory and applications. Possibility Theory versus Probab","volume":"32","author":"Klir George J","year":"1996","unstructured":"George J Klir and Bo Yuan. 1996. Fuzzy sets and fuzzy logic: theory and applications. Possibility Theory versus Probab. Theory 32, 2 (1996), 207--208.","journal-title":"Theory"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Eighteenth International Conference on Machine Learning. 282--289","author":"Lafferty John D","year":"2001","unstructured":"John D Lafferty, Andrew McCallum, and Fernando CN Pereira. 2001. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data. In Proceedings of the Eighteenth International Conference on Machine Learning. 282--289."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.18653\/v1\/N16-1030"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.24963\/ijcai.2018\/578"},{"unstructured":"Chang Liu Xin Wang Richard Shin Joseph E Gonzalez and Dawn Song. 2016. Neural code completion. (2016).","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.3115\/1118108.1118117"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.18653\/v1\/P16-1101"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1007\/s10664-015-9381-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1007\/BFb0053375"},{"key":"e_1_3_2_1_44_1","volume-title":"Combining Program Analysis and Statistical Language Model for Code Statement Completion. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 710--721","author":"Nguyen Son","year":"2019","unstructured":"Son Nguyen, Tien Nguyen, Yi Li, and Shaohua Wang. 2019. Combining Program Analysis and Statistical Language Model for Code Statement Completion. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 710--721."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/ICSME.2019.00066"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1109\/SANER.2017.7884644"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1109\/ASE.2015.36"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 40th annual meeting on association for computational linguistics. Association for Computational Linguistics, 311--318","author":"Papineni Kishore","year":"2002","unstructured":"Kishore Papineni, Salim Roukos, Todd Ward, and Wei-Jing Zhu. 2002. BLEU: a method for automatic evaluation of machine translation. In Proceedings of the 40th annual meeting on association for computational linguistics. Association for Computational Linguistics, 311--318."},{"unstructured":"Terence Parr. 2013. The definitive ANTLR 4 reference. Pragmatic Bookshelf.","key":"e_1_3_2_1_49_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1109\/IJCNN.2001.938396"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1109\/SCAM.2014.15"},{"key":"e_1_3_2_1_52_1","volume-title":"Conference on Empirical Methods in Natural Language Processing.","author":"Ratnaparkhi Adwait","year":"1996","unstructured":"Adwait Ratnaparkhi. 1996. A maximum entropy model for part-of-speech tagging. In Conference on Empirical Methods in Natural Language Processing."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/941566.941569"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.1109\/78.650093"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1145\/2901739.2901757"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1145\/1454268.1454277"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1109\/TSE.2010.7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1109\/ICSE.2009.5070548"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.3115\/1219840.1219913"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1109\/ICSE.2019.00021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_3_2_1_62_1","volume-title":"Critical values and probability levels for the Wilcoxon rank sum test and the Wilcoxon signed rank test. Selected tables in mathematical statistics 1","author":"Wilcoxon Frank","year":"1970","unstructured":"Frank Wilcoxon, SK Katti, and Roberta A Wilcox. 1970. Critical values and probability levels for the Wilcoxon rank sum test and the Wilcoxon signed rank test. Selected tables in mathematical statistics 1 (1970), 171--259."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.18653\/v1\/D16-1137"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing. 88--94","author":"Xue Nianwen","year":"2004","unstructured":"Nianwen Xue and Martha Palmer. 2004. Calibrating features for semantic role labeling. In Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing. 88--94."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.18653\/v1\/N16-1174"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_66_1","DOI":"10.18653\/v1\/P17-1041"},{"key":"e_1_3_2_1_67_1","volume-title":"Simple Testing Can Prevent Most Critical Failures. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)","author":"Yuan Ding","year":"2014","unstructured":"Ding Yuan, You Luo, Xin Zhuang, Guilherme Renna Rodrigues, and Xu Zhao. 2014. Simple Testing Can Prevent Most Critical Failures. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_68_1","DOI":"10.1145\/2610384.2610412"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.1145\/3377811.3380383"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_70_1","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_2_1_71_1","volume-title":"proceedings of the 40th Annual Meeting on Association for Computational Linguistics. Association for Computational Linguistics, 473--480","author":"Zhou GuoDong","year":"2002","unstructured":"GuoDong Zhou and Jian Su. 2002. Named entity recognition using an HMM-based chunk tagger. In proceedings of the 40th Annual Meeting on Association for Computational Linguistics. Association for Computational Linguistics, 473--480."}],"event":{"sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"ASE '20","name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416568","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":71,"alternative-id":["10.1145\/3324884.3416568","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416568","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}