{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:10:28Z","timestamp":1776103828023,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["Discovery Grant"],"award-info":[{"award-number":["Discovery Grant"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445048","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T06:21:46Z","timestamp":1620454906000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["NBSearch: Semantic Search and Visual Exploration of Computational Notebooks"],"prefix":"10.1145","author":[{"given":"Xingjun","family":"Li","sequence":"first","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Yuanxin","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Hong","family":"Wang","sequence":"additional","affiliation":[{"name":"Computer Science Arizona State University, United States"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Uber Technologies Inc., United States"}]},{"given":"Jian","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science University of Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.291"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376729"},{"key":"e_1_3_2_2_3_1","unstructured":"Junyoung Chung \u00c7aglar G\u00fcl\u00e7ehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. CoRR abs\/1412.3555(2014). arxiv:1412.3555http:\/\/arxiv.org\/abs\/1412.3555  Junyoung Chung \u00c7aglar G\u00fcl\u00e7ehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. CoRR abs\/1412.3555(2014). arxiv:1412.3555http:\/\/arxiv.org\/abs\/1412.3555"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.176"},{"key":"e_1_3_2_2_5_1","volume-title":"Accessed","author":"Cloud Google","year":"2020","unstructured":"Google Cloud . Accessed in 2020 . Evaluating models. https:\/\/cloud.google.com\/translate\/automl\/docs\/evaluate Google Cloud. Accessed in 2020. Evaluating models. https:\/\/cloud.google.com\/translate\/automl\/docs\/evaluate"},{"key":"e_1_3_2_2_6_1","volume-title":"Accessed","author":"Library\u00a0Digital Collections UCSD","year":"2020","unstructured":"UCSD Library\u00a0Digital Collections . Accessed in 2020 . Data from: Exploration and Explanation in Computational Notebooks . https:\/\/library.ucsd.edu\/dc\/object\/bb2733859v UCSD Library\u00a0Digital Collections. Accessed in 2020. Data from: Exploration and Explanation in Computational Notebooks. https:\/\/library.ucsd.edu\/dc\/object\/bb2733859v"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2856767.2856797"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.252"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173711"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.242"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.173"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the 4th USENIX Conference on Theory and Practice of Provenance(TaPP\u201912)","author":"J.","unstructured":"Philip\u00a0 J. Guo and Margo Seltzer. 2012. BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure . In Proceedings of the 4th USENIX Conference on Theory and Practice of Provenance(TaPP\u201912) . 7. Philip\u00a0J. Guo and Margo Seltzer. 2012. BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure. In Proceedings of the 4th USENIX Conference on Theory and Practice of Provenance(TaPP\u201912). 7."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300500"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376798"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/223904.223912"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-1119(88)90330-7"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174106"},{"key":"e_1_3_2_2_19_1","volume-title":"Accessed","author":"Face Hugging","year":"2020","unstructured":"Hugging Face . Accessed in 2020 . Pretrained Models . https:\/\/huggingface.co\/transformers\/pretrained_models.html Hugging Face. Accessed in 2020. Pretrained Models. https:\/\/huggingface.co\/transformers\/pretrained_models.html"},{"key":"e_1_3_2_2_20_1","volume-title":"Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. arxiv:1502.03167\u00a0[cs.LG]","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015 . Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. arxiv:1502.03167\u00a0[cs.LG] Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. arxiv:1502.03167\u00a0[cs.LG]"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025626"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300322"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173748"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702224"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6596-6_6"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242766"},{"key":"e_1_3_2_2_27_1","volume-title":"Le and Tomas Mikolov","author":"V.","year":"2014","unstructured":"Quoc\u00a0 V. Le and Tomas Mikolov . 2014 . Distributed Representations of Sentences and Documents . arxiv:1405.4053\u00a0[cs.CL] Quoc\u00a0V. Le and Tomas Mikolov. 2014. Distributed Representations of Sentences and Documents. arxiv:1405.4053\u00a0[cs.CL]"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321726"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0118-x"},{"key":"e_1_3_2_2_30_1","unstructured":"Minh-Thang Luong Hieu Pham and Christopher\u00a0D. Manning. 2015. Effective Approaches to Attention-based Neural Machine Translation. CoRR abs\/1508.04025(2015). arxiv:1508.04025http:\/\/arxiv.org\/abs\/1508.04025  Minh-Thang Luong Hieu Pham and Christopher\u00a0D. Manning. 2015. Effective Approaches to Attention-based Neural Machine Translation. CoRR abs\/1508.04025(2015). arxiv:1508.04025http:\/\/arxiv.org\/abs\/1508.04025"},{"key":"e_1_3_2_2_31_1","volume-title":"Introduction to Information Retrieval","author":"Manning D.","unstructured":"Christopher\u00a0 D. Manning , Prabhakar Raghavan , and Hinrich Sch\u00fctze . 2008. Introduction to Information Retrieval . Cambridge University Press . Christopher\u00a0D. Manning, Prabhakar Raghavan, and Hinrich Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2011.84"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.111"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025171.3025223"},{"key":"e_1_3_2_2_36_1","unstructured":"Radim \u0158eh\u016f\u0159ek and Petr Sojka. 2010. Software Framework for Topic Modelling with Large Corpora.  Radim \u0158eh\u016f\u0159ek and Petr Sojka. 2010. Software Framework for Topic Modelling with Large Corpora."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173606"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786855"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/vissoft.2016.20"},{"key":"e_1_3_2_2_42_1","unstructured":"Alex Sherstinsky. 2018. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network. CoRR abs\/1808.03314(2018). arxiv:1808.03314http:\/\/arxiv.org\/abs\/1808.03314  Alex Sherstinsky. 2018. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network. CoRR abs\/1808.03314(2018). arxiv:1808.03314http:\/\/arxiv.org\/abs\/1808.03314"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063239.2063243"},{"key":"e_1_3_2_2_44_1","volume-title":"Accessed","year":"2020","unstructured":"SourceForge. Accessed in 2020 . . https:\/\/sourceforge.net\/ SourceForge. Accessed in 2020. . https:\/\/sourceforge.net\/"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2004.56"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376764"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985745"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/VDS48975.2019.8973385"},{"key":"e_1_3_2_2_49_1","volume-title":"Accessed","author":"Wikipedia","year":"2020","unstructured":"Wikipedia contributors. Accessed in 2020 . Koders \u2014 Wikipedia, The Free Encyclopedia . https:\/\/en.wikipedia.org\/w\/index.php?title=Koders&oldid=869578010 Wikipedia contributors. Accessed in 2020. Koders \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Koders&oldid=869578010"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1561\/1800000003"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173903"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.167"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858488"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445048","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:29Z","timestamp":1750195709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":53,"alternative-id":["10.1145\/3411764.3445048","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445048","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}