{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:38Z","timestamp":1776782858255,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"General Program of National Natural Science Foundation of China","award":["No. 61972006"],"award-info":[{"award-number":["No. 61972006"]}]},{"name":"National Natural Science Fund for Distinguished Young Scholars of China","award":["No. 61525201"],"award-info":[{"award-number":["No. 61525201"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389278","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"48-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Adaptive Deep Code Search"],"prefix":"10.1145","author":[{"given":"Chunyang","family":"Ling","sequence":"first","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, China, Peking University, Beijing, China"}]},{"given":"Zeqi","family":"Lin","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, China, Peking University, Beijing, China"}]},{"given":"Yanzhen","family":"Zou","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, China, Peking University, Beijing, China"}]},{"given":"Bing","family":"Xie","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, China, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications. ACM, 681--682.","author":"Bajracharya Sushil"},{"key":"e_1_3_2_1_2_1","first-page":"1137","article-title":"A neural probabilistic language model","author":"Bengio Yoshua","year":"2003","journal-title":"Journal of machine learning research 3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.18"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753402"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393606"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00593-0_26"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240471"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159659"},{"key":"e_1_3_2_1_10_1","volume-title":"Path-based function embedding and its application to specification mining. arXiv preprint arXiv:1802.07779","author":"DeFreez Daniel","year":"2018"},{"key":"e_1_3_2_1_11_1","volume-title":"Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495","author":"Ganin Yaroslav","year":"2014"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 28th international conference on machine learning (ICML-11)","author":"Glorot Xavier","year":"2011"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Machine Learning. 222--230","author":"Gong Boqing","year":"2013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180167"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983769"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486898"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236085"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100115"},{"key":"e_1_3_2_1_20_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997"},{"key":"e_1_3_2_1_21_1","unstructured":"Baotian Hu Zhengdong Lu Hang Li and Qingcai Chen. 2014. Convolutional neural network architectures for matching natural language sentences. In Advances in neural information processing systems. 2042--2050.  Baotian Hu Zhengdong Lu Hang Li and Qingcai Chen. 2014. Convolutional neural network architectures for matching natural language sentences. In Advances in neural information processing systems. 2042--2050."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238191"},{"key":"e_1_3_2_1_24_1","volume-title":"ROSF: Leveraging information retrieval and supervised learning for recommending code snippets","author":"Jiang He","year":"2016"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568292"},{"key":"e_1_3_2_1_26_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014"},{"key":"e_1_3_2_1_27_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597087"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950341"},{"key":"e_1_3_2_1_30_1","volume-title":"Adversarial multi-task learning for text classification. arXiv preprint arXiv:1704.05742","author":"Liu Pengfei","year":"2017"},{"key":"e_1_3_2_1_31_1","volume-title":"Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791","author":"Long Mingsheng","year":"2015"},{"key":"e_1_3_2_1_32_1","unstructured":"Mingsheng Long Han Zhu Jianmin Wang and Michael I Jordan. 2016. Unsupervised domain adaptation with residual transfer networks. In Advances in Neural Information Processing Systems. 136--144.  Mingsheng Long Han Zhu Jianmin Wang and Michael I Jordan. 2016. Unsupervised domain adaptation with residual transfer networks. In Advances in Neural Information Processing Systems. 136--144."},{"key":"e_1_3_2_1_33_1","volume-title":"2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 545--549","author":"Lu Meili","year":"2015"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.42"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985809"},{"key":"e_1_3_2_1_36_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_3_2_1_37_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818860"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.47"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2560165"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI, 2793--2799","author":"Pang Liang","year":"2016"},{"key":"e_1_3_2_1_43_1","volume-title":"Manning","author":"Pennington Jeffrey","year":"2014"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1104"},{"key":"e_1_3_2_1_45_1","volume-title":"Stochastic backpropagation and approximate inference in deep generative models. arXiv preprint arXiv:1401.4082","author":"Rezende Danilo Jimenez","year":"2014"},{"key":"e_1_3_2_1_46_1","volume-title":"Function Assistant: A Tool for NL Querying of APIs. arXiv preprint arXiv:1706.00468","author":"Richardson Kyle","year":"2017"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_2_1_48_1","volume-title":"CASCON First Decade High Impact Papers","author":"Singer Janice"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9544-y"},{"key":"e_1_3_2_1_50_1","volume-title":"Guy Van den Broeck, and Miryung Kim","author":"Sivaraman Aishwarya","year":"2018"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747213"},{"key":"e_1_3_2_1_54_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2015.7415532"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642947"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080809"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9264-x"},{"key":"e_1_3_2_1_59_1","volume-title":"Transfer learning for sequence tagging with hierarchical recurrent networks. arXiv preprint arXiv:1703.06345","author":"Yang Zhilin","year":"2017"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884862"}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","location":"Seoul Republic of Korea","acronym":"ICPC '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:37Z","timestamp":1750200097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":60,"alternative-id":["10.1145\/3387904.3389278","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389278","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}