{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:29:53Z","timestamp":1775665793447,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3417067","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:08:44Z","timestamp":1605042524000},"page":"1285-1295","source":"Crossref","is-referenced-by-count":9,"title":["Clustering test steps in natural language toward automating test automation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5403-3217","authenticated-orcid":false,"given":"Linyi","family":"Li","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Zhenwen","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Weijie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"given":"Jun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"given":"Pengcheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"given":"Jing","family":"Wu","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"given":"Guanghua","family":"He","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"given":"Xia","family":"Zeng","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"given":"Yuetang","family":"Deng","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6731-216X","authenticated-orcid":false,"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Clustering the source code. WSEAS Transactions on Computers 8 ( 12 2009 )","author":"Asif Nadim","year":"1835"},{"key":"e_1_3_2_2_2_1","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"Bergstra James","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2004.1335683"},{"key":"e_1_3_2_2_4_1","unstructured":"Cucumber. 2019. Cucumber. https:\/\/cucumber.io. Accessed: 05-03-2020.  Cucumber. 2019. Cucumber. https:\/\/cucumber.io. Accessed: 05-03-2020."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"e_1_3_2_2_6_1","first-page":"226","volume-title":"Proceedings of the 1996 2nd International Conference on Knowledge Discovery and Data Mining (KDD '96)","author":"Ester Martin","year":"1996"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Alessandro Fantechi Stefania Gnesi Giuseppe Lami and Alessandro Maccari. 2003. Applications of linguistic techniques for use case analysis. Requirements Engineering 8 3 ( 2003 ) 161-170.  Alessandro Fantechi Stefania Gnesi Giuseppe Lami and Alessandro Maccari. 2003. Applications of linguistic techniques for use case analysis. Requirements Engineering 8 3 ( 2003 ) 161-170.","DOI":"10.1007\/s00766-003-0174-0"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Anil K Jain M Narasimha Murty and Patrick J Flynn. 1999. Data clustering: A review. ACM Computing Surveys (CSUR) 31 3 ( 1999 ) 264-323.  Anil K Jain M Narasimha Murty and Patrick J Flynn. 1999. Data clustering: A review. ACM Computing Surveys (CSUR) 31 3 ( 1999 ) 264-323.","DOI":"10.1145\/331499.331504"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1477-8696.1993.tb05899.x"},{"key":"e_1_3_2_2_11_1","first-page":"957","volume-title":"Proceedings of Machine Learning Research","volume":"37","author":"Kusner Matt","year":"2015"},{"key":"e_1_3_2_2_12_1","first-page":"2267","volume-title":"Proceedings of the 2015 29th AAAI Conference on Artificial Intelligence (AAAI '15)","author":"Lai Siwei","year":"2015"},{"key":"e_1_3_2_2_13_1","first-page":"1188","volume-title":"Proceedings of Machine Learning Research","volume":"32","author":"Le Quoc","year":"2014"},{"key":"e_1_3_2_2_14_1","unstructured":"Zachary C Lipton John Berkowitz and Charles Elkan. 2015. A critical review of recurrent neural networks for sequence learning. CoRR abs\/1506.00019 ( 2015 ). arXiv: 1506.00019 http:\/\/arxiv.org\/abs\/1506.00019  Zachary C Lipton John Berkowitz and Charles Elkan. 2015. A critical review of recurrent neural networks for sequence learning. CoRR abs\/1506.00019 ( 2015 ). arXiv: 1506.00019 http:\/\/arxiv.org\/abs\/1506.00019"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1166253.1166275"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 2016 25th International Joint Conference on Artificial Intelligence (New York, New York) ( IJCAI '16). AAAI Press, 2873-2879","author":"Liu Pengfei","year":"2016"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719970.1719994"},{"key":"e_1_3_2_2_19_1","volume-title":"Introduction to information retrieval","author":"Manning Christopher D."},{"key":"e_1_3_2_2_20_1","unstructured":"Mitchell P. Marcus Beatrice Santorini and Mary Ann Marcinkiewicz. 1993. Building a large annotated corpus of English: The penn treebank. Computational Linguistics 19 2 ( 1993 ) 313-330. https:\/\/www.aclweb.org\/anthology\/J93-2004  Mitchell P. Marcus Beatrice Santorini and Mary Ann Marcinkiewicz. 1993. Building a large annotated corpus of English: The penn treebank. Computational Linguistics 19 2 ( 1993 ) 313-330. https:\/\/www.aclweb.org\/anthology\/J93-2004"},{"key":"e_1_3_2_2_21_1","first-page":"3111","volume-title":"Proceedings of the 2013 26th International Conference on Neural Information Processing Systems (NIPS '13)","volume":"2","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01716-3_18"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","volume-title":"Mining of massive datasets","author":"Rajaraman Anand","DOI":"10.1017\/CBO9781139058452"},{"key":"e_1_3_2_2_24_1","first-page":"554","volume-title":"Proceedings of the 1999 12th Advances in Neural Information Processing Systems (NIPS '99)","author":"Rasmussen Carl Edward","year":"1999"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"David E Rumelhart Geofrey E Hinton and Ronald J Williams. 1986. Learning representations by back-propagating errors. Nature 323 6088 ( 1986 ) 533-536.  David E Rumelhart Geofrey E Hinton and Ronald J Williams. 1986. Learning representations by back-propagating errors. Nature 323 6088 ( 1986 ) 533-536.","DOI":"10.1038\/323533a0"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/792024"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.19"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270320"},{"key":"e_1_3_2_2_29_1","volume-title":"Numerical taxonomy: The principles and practice of numerical classification","author":"Sneath Peter HA"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2018.08.003"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606650"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227131"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119195"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3115\/1073445.1073478"},{"key":"e_1_3_2_2_35_1","first-page":"6000","volume-title":"Proceedings of the 2017 31st International Conference on Neural Information Processing Systems (NIPS '17)","author":"Vaswani Ashish","year":"2017"},{"key":"e_1_3_2_2_36_1","first-page":"375","volume-title":"Proceedings of the 2006 1st Iberian Conference on Information Systems and Technologies (CISTI '06)","volume":"2","author":"Videira Carlos","year":"2006"},{"key":"e_1_3_2_2_37_1","volume-title":"Briand","author":"Wang Chunhui","year":"2019"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3417067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3417067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:58Z","timestamp":1750197718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3417067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":37,"alternative-id":["10.1145\/3368089.3417067","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3417067","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]}}}