{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:17:29Z","timestamp":1770283049958,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T00:00:00Z","timestamp":1591833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1908633"],"award-info":[{"award-number":["CCF-1908633"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009927","name":"U.S. Air Force","doi-asserted-by":"publisher","award":["FA8750-19-2-0006"],"award-info":[{"award-number":["FA8750-19-2-0006"]}],"id":[{"id":"10.13039\/100009927","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,11]]},"DOI":"10.1145\/3385412.3386005","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:40:10Z","timestamp":1591494010000},"page":"16-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Type error feedback via analytic program repair"],"prefix":"10.1145","author":[{"given":"Georgios","family":"Sakkas","sequence":"first","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"Madeline","family":"Endres","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Benjamin","family":"Cosman","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"Westley","family":"Weimer","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Ranjit","family":"Jhala","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183377.3183383"},{"key":"e_1_3_2_1_2_1","unstructured":"Miltiadis Allamanis Marc Brockschmidt and Mahmoud Khademi. 2017. Learning to Represent Programs with Graphs. arXiv: cs.LG\/1711.00740"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360585"},{"key":"e_1_3_2_1_4_1","unstructured":"Avishkar Bhoopchand Tim Rockt\u00e4schel Earl Barr and Sebastian Riedel. 2016. Learning Python Code Suggestion with a Sparse Pointer Network. arXiv: cs.NE\/1611.08307"},{"key":"e_1_3_2_1_5_1","volume-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","author":"Bishop Christopher M.","unstructured":"Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag, Berlin, Heidelberg, 209\u2013210."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535863"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJeqs6EFvB","author":"Dinella Elizabeth","year":"2020","unstructured":"Elizabeth Dinella, Hanjun Dai, Ziyang Li, Mayur Naik, Le Song, and Ke Wang. 2020. Hoppity: Laerning Graph Transformations to Detect and Fix Bugs in Programs. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJeqs6EFvB"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(92)90014-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882315"},{"key":"e_1_3_2_1_10_1","volume-title":"Deep Learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press, 180\u2013184. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_1_11_1","volume-title":"Automated clustering and program repair for introductory programming assignments. Programming Language Design and Implementation","author":"Gulwani Sumit","year":"2018","unstructured":"Sumit Gulwani, Ivan Radicek, and Florian Zuleger. 2018. Automated clustering and program repair for introductory programming assignments. Programming Language Design and Implementation (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36575-3_20"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Andrew Head Elena Glassman Gustavo Soares Ryo Suzuki Lucas Figueredo Loris D\u2019Antoni and Bj\u00f6rn Hartmann. 2017. Writing Reusable Code Feedback at Scale with Mixed-Initiative Program Synthesis. In Learning @ Scale. 89\u201398. 10.1145\/3051457","DOI":"10.1145\/3051457"},{"key":"e_1_3_2_1_15_1","unstructured":"3051467"},{"key":"e_1_3_2_1_16_1","volume-title":"On the Naturalness of Software. In International Conference on Software Engineering (ICSE \u201912)","author":"Hindle Abram","year":"2012","unstructured":"Abram Hindle, Earl T Barr, Zhendong Su, Mark Gabel, and Premkumar Devanbu. 2012. On the Naturalness of Software. In International Conference on Software Engineering (ICSE \u201912). Piscataway, NJ, USA, 837\u2013847."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"e_1_3_2_1_18_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. arXiv: cs.LG\/1412.6980"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.RTA.2011.219"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Eelco Lempsink. 2009. Generic type-safe diff and patch for families of datatypes. Master\u2019s thesis. Universiteit Utrecht.","DOI":"10.1145\/1596614.1596624"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250783"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2983994"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614"},{"key":"e_1_3_2_1_25_1","unstructured":"2837617"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.54"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9282-8"},{"key":"e_1_3_2_1_28_1","first-page":"3","article-title":"Analyzing Novice Programmers\u2019 Response to Compiler Error Messages","volume":"31","author":"Munson Jonathan P.","year":"2016","unstructured":"Jonathan P. Munson and Elizabeth A. Schilling. 2016. Analyzing Novice Programmers\u2019 Response to Compiler Error Messages. J. Comput. Sci. Coll. 31, 3 (Jan. 2016), 53\u201361. http:\/\/dl.acm.org\/citation.cfm? id=2835377.2835386","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Machine Learning. 807\u2013814","author":"Nair Vinod","year":"2010","unstructured":"Vinod Nair and Geoffrey E Hinton. 2010. Rectified linear units improve restricted boltzmann machines. In International Conference on Machine Learning. 807\u2013814."},{"key":"e_1_3_2_1_30_1","volume-title":"Neural Networks and Deep Learning","author":"Nielsen Michael A","unstructured":"Michael A Nielsen. 2015. Neural Networks and Deep Learning. Determination Press."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660230"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2015.04.012"},{"key":"e_1_3_2_1_34_1","unstructured":"Reudismam Rolim Gustavo Soares Rohit Gheyi Titus Barik and Loris D\u2019Antoni. 2018. Learning Quick Fixes from Code Repositories. arXiv: cs.SE\/1803.03806"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019"},{"key":"e_1_3_2_1_36_1","unstructured":"00020"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Eric L Seidel and Ranjit Jhala. 2017. A Collection of Novice Interactions with the OCaml Top-Level System. 806813 10.5281\/zenodo.806813","DOI":"10.5281\/zenodo.806813"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2951913.2951915"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3138818"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462195"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360614"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/366378.366379"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Mitchell Wand. 1986. Finding the Source of Type Errors. In Principles of Programming Languages. 38\u201343. 10.1145\/512644.512648","DOI":"10.1145\/512644.512648"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192384"}],"event":{"name":"PLDI '20: 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation","location":"London UK","acronym":"PLDI '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385412.3386005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3385412.3386005","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3385412.3386005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:49Z","timestamp":1750199929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385412.3386005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,11]]},"references-count":45,"alternative-id":["10.1145\/3385412.3386005","10.1145\/3385412"],"URL":"https:\/\/doi.org\/10.1145\/3385412.3386005","relation":{},"subject":[],"published":{"date-parts":[[2020,6,11]]},"assertion":[{"value":"2020-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}