{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:38:06Z","timestamp":1769751486607,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409715","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:08:44Z","timestamp":1605042524000},"page":"209-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["TypeWriter: neural type prediction with search-based validation"],"prefix":"10.1145","author":[{"given":"Michael","family":"Pradel","sequence":"first","affiliation":[{"name":"University of Stuttgart, Germany"}]},{"given":"Georgios","family":"Gousios","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands"}]},{"given":"Jason","family":"Liu","sequence":"additional","affiliation":[{"name":"Facebook, USA"}]},{"given":"Satish","family":"Chandra","sequence":"additional","affiliation":[{"name":"Facebook, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Miltiadis Allamanis Earl T Barr Premkumar Devanbu and Charles Sutton. 2018. A survey of machine learning for big code and naturalness. ACM Computing Surveys (CSUR) 51 4 ( 2018 ) 81.  Miltiadis Allamanis Earl T Barr Premkumar Devanbu and Charles Sutton. 2018. A survey of machine learning for big code and naturalness. ACM Computing Surveys (CSUR) 51 4 ( 2018 ) 81.","DOI":"10.1145\/3212695"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926437"},{"key":"e_1_3_2_2_4_1","first-page":"428","volume-title":"Towards Type Inference for JavaScript. In ECOOP 2005-Object-Oriented Programming, Andrew P. Black (Ed.). Springer Berlin Heidelberg","author":"Anderson Christopher","year":"2005"},{"key":"e_1_3_2_2_5_1","volume-title":"Modeling Vocabulary for Big Code Machine Learning. CoRR ( 2019 ). https:\/\/arxiv.org\/abs\/","author":"Babii Hlib","year":"1904"},{"key":"e_1_3_2_2_6_1","first-page":"1","article-title":"Getafix: Learning to Fix Bugs Automatically","volume":"159","author":"Bader Johannes","year":"2019","journal-title":"OOPSLA."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984017"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529700"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.75"},{"key":"e_1_3_2_2_10_1","unstructured":"Xiaodong Gu Hongyu Zhang and Sunghun Kim. 2018. Deep Code Search. In ICSE.  Xiaodong Gu Hongyu Zhang and Sunghun Kim. 2018. Deep Code Search. In ICSE."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Rahul Gupta Soham Pal Aditya Kanade and Shirish Shevade. 2017. DeepFix: Fixing Common C Language Errors by Deep Learning. In AAAI.  Rahul Gupta Soham Pal Aditya Kanade and Shirish Shevade. 2017. DeepFix: Fixing Common C Language Errors by Deep Learning. In AAAI.","DOI":"10.1609\/aaai.v31i1.10742"},{"key":"e_1_3_2_2_12_1","first-page":"7944","article-title":"Learning to Repair Software Vulnerabilities with Generative Adversarial Networks","author":"Harer Jacob","year":"2018","journal-title":"NeurIPS."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Mark Harman and Bryan F Jones. 2001. Search-based software engineering. Information and software Technology 43 14 ( 2001 ) 833-839.  Mark Harman and Bryan F Jones. 2001. Search-based software engineering. Information and software Technology 43 14 ( 2001 ) 833-839.","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_2"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236051"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106290"},{"key":"e_1_3_2_2_17_1","volume-title":"Static Analysis","author":"Jensen Simon Holm"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Rafael-Michael Karampatsis Hlib Babii Romain Robbes Charles Sutton and Andrea Janes. 2020. Big Code != Big Vocabulary: Open-Vocabulary Models for Source Code. In ICSE.  Rafael-Michael Karampatsis Hlib Babii Romain Robbes Charles Sutton and Andrea Janes. 2020. Big Code != Big Vocabulary: Open-Vocabulary Models for Source Code. In ICSE.","DOI":"10.1145\/3377811.3380342"},{"key":"e_1_3_2_2_19_1","first-page":"1","article-title":"Learning to spot and refactor inconsistent method names","author":"Liu Kui","year":"2019","journal-title":"ICSE."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00045"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384666"},{"key":"e_1_3_2_2_23_1","volume-title":"Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3015812.3016002"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00089"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238173"},{"key":"e_1_3_2_2_27_1","volume-title":"Scafle: Bug Localization on Millions of Files. In International Symposium on Software Testing and Analysis (ISSTA).","author":"Pradel Michael","year":"2020"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2677009"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480655"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211346.3211353"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313752"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00021"},{"key":"e_1_3_2_2_34_1","unstructured":"G. van Rossum J. Lehtosalo and L. Langa. 2014. PEP484: Type Hints. https: \/\/www.python.org\/dev\/peps\/pep-0484\/. [Online; accessed 25-July-2019].  G. van Rossum J. Lehtosalo and L. Langa. 2014. PEP484: Type Hints. https: \/\/www.python.org\/dev\/peps\/pep-0484\/. [Online; accessed 25-July-2019]."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106289"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775052.2661101"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Cody Watson Michele Tufano Kevin Moran Gabriele Bavota and Denys Poshyvanyk. 2020. On Learning Meaningful Assert Statements for Unit Test Cases. In ICSE.  Cody Watson Michele Tufano Kevin Moran Gabriele Bavota and Denys Poshyvanyk. 2020. On Learning Meaningful Assert Statements for Unit Test Cases. In ICSE.","DOI":"10.1145\/3377811.3380429"},{"key":"e_1_3_2_2_38_1","first-page":"87","article-title":"Deep learning code fragments for code clone detection","author":"White Martin","year":"2016","journal-title":"ASE."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950343"},{"key":"e_1_3_2_2_40_1","volume-title":"Marc Brockschmidt Miltiadis Allamanis and, and Alexander L. Gaunt","author":"Yin Pengcheng","year":"2018"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Jian Zhang Xu Wang Hongyu Zhang Hailong Sun Kaixuan Wang and Xudong Liu. 2019. A Novel Neural Source Code Representation based on Abstract Syntax Tree. In ICSE.  Jian Zhang Xu Wang Hongyu Zhang Hailong Sun Kaixuan Wang and Xudong Liu. 2019. A Novel Neural Source Code Representation based on Abstract Syntax Tree. In ICSE.","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"e_1_3_2_2_43_1","volume-title":"Neural Networks for Modeling Source Code Edits. arXiv preprint arXiv","author":"Zhao Rui","year":"1904"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:40Z","timestamp":1750203880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409715"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":43,"alternative-id":["10.1145\/3368089.3409715","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409715","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}