{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:13:04Z","timestamp":1752984784055,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3512759","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"549-560","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DeepAnalyze"],"prefix":"10.1145","author":[{"given":"Manish","family":"Shetty","sequence":"first","affiliation":[{"name":"Microsoft Research, Bangalore, India"}]},{"given":"Chetan","family":"Bansal","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Suman","family":"Nath","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Sean","family":"Bowles","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Henry","family":"Wang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Ozgur","family":"Arman","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Siamak","family":"Ahari","sequence":"additional","affiliation":[{"name":"Microsoft"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. About WER. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/wer\/about-wer. Accessed: 2021-08-30."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Using the !analyze Extension. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/using-the-analyze-extension. Accessed: 2021-08-30."},{"key":"e_1_3_2_1_3_1","volume-title":"Tied multitask learning for neural speech translation. arXiv preprint arXiv:1802.06655","author":"Anastasopoulos Antonios","year":"2018","unstructured":"Antonios Anastasopoulos and David Chiang. 2018. Tied multitask learning for neural speech translation. arXiv preprint arXiv:1802.06655 (2018)."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. 2010. Diagnosing Issues Using Crash Reports and Device Logs. https:\/\/developer.apple.com\/documentation\/xcode\/diagnosing-issues-using-crash-reports-and-device-logs."},{"key":"e_1_3_2_1_5_1","volume-title":"Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473","author":"Bahdanau Dzmitry","year":"2014","unstructured":"Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87479-9_26"},{"key":"e_1_3_2_1_7_1","volume-title":"Multitask learning. Machine learning 28, 1","author":"Caruana Rich","year":"1997","unstructured":"Rich Caruana. 1997. Multitask learning. Machine learning 28, 1 (1997), 41--75."},{"key":"e_1_3_2_1_8_1","unstructured":"Rich Caruana Shumeet Baluja Tom Mitchell et al. 1996. Using the future to \"sort out\" the present: Rankprop and multitask learning for medical risk evaluation. Advances in neural information processing systems (1996) 959--965."},{"key":"e_1_3_2_1_9_1","volume-title":"Multi-task learning for sequence tagging: An empirical study. arXiv preprint arXiv:1808.04151","author":"Changpinyo Soravit","year":"2018","unstructured":"Soravit Changpinyo, Hexiang Hu, and Fei Sha. 2018. Multi-task learning for sequence tagging: An empirical study. arXiv preprint arXiv:1808.04151 (2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1047"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-659"},{"key":"e_1_3_2_1_12_1","unstructured":"Chromium. 2020. Chromium CrashPad . https:\/\/chromium.googlesource.com\/crashpad\/crashpad\/+\/refs\/heads\/main\/README.md."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390177"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227111"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622559.1622562"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_17_1","volume-title":"Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning. In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 31--40","author":"Gong Xi","year":"2019","unstructured":"Xi Gong, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, and Zhuobing Han. 2019. Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning. In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 31--40."},{"key":"e_1_3_2_1_18_1","volume-title":"Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural networks 18, 5--6","author":"Graves Alex","year":"2005","unstructured":"Alex Graves and J\u00fcrgen Schmidhuber. 2005. Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural networks 18, 5--6 (2005), 602--610."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.11.004"},{"key":"e_1_3_2_1_20_1","volume-title":"Greg Ver Steeg, and Aram Galstyan","author":"Harutyunyan Hrayr","year":"2019","unstructured":"Hrayr Harutyunyan, Hrant Khachatrian, David C Kale, Greg Ver Steeg, and Aram Galstyan. 2019. Multitask learning and benchmarking with clinical time series data. Scientific data 6, 1 (2019), 1--18."},{"key":"e_1_3_2_1_21_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_20"},{"key":"e_1_3_2_1_24_1","volume-title":"A statistical interpretation of term specificity and its application in retrieval. Journal of documentation","author":"Jones Karen Sparck","year":"1972","unstructured":"Karen Sparck Jones. 1972. A statistical interpretation of term specificity and its application in retrieval. Journal of documentation (1972)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.223"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953075"},{"key":"e_1_3_2_1_27_1","unstructured":"John Lafferty Andrew McCallum and Fernando CN Pereira. 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. (2001)."},{"key":"e_1_3_2_1_28_1","volume-title":"Neural architectures for named entity recognition. arXiv preprint arXiv:1603.01360","author":"Lample Guillaume","year":"2016","unstructured":"Guillaume Lample, Miguel Ballesteros, Sandeep Subramanian, Kazuya Kawakami, and Chris Dyer. 2016. Neural architectures for named entity recognition. arXiv preprint arXiv:1603.01360 (2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553453"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2981314"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416627"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1035"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389261"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416591"},{"key":"e_1_3_2_1_35_1","volume-title":"Recurrent neural network for text classification with multi-task learning. arXiv preprint arXiv:1605.05101","author":"Liu Pengfei","year":"2016","unstructured":"Pengfei Liu, Xipeng Qiu, and Xuanjing Huang. 2016. Recurrent neural network for text classification with multi-task learning. arXiv preprint arXiv:1605.05101 (2016)."},{"key":"e_1_3_2_1_36_1","volume-title":"A statistical approach to mechanized encoding and searching of literary information. IBM Journal of research and development 1, 4","author":"Luhn Hans Peter","year":"1957","unstructured":"Hans Peter Luhn. 1957. A statistical approach to mechanized encoding and searching of literary information. IBM Journal of research and development 1, 4 (1957), 309--317."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btx761"},{"key":"e_1_3_2_1_38_1","volume-title":"Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025","author":"Luong Minh-Thang","year":"2015","unstructured":"Minh-Thang Luong, Hieu Pham, and Christopher D Manning. 2015. Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025 (2015)."},{"key":"e_1_3_2_1_39_1","volume-title":"Caiming Xiong, and Richard Socher.","author":"McCann Bryan","year":"2018","unstructured":"Bryan McCann, Nitish Shirish Keskar, Caiming Xiong, and Richard Socher. 2018. The natural language decathlon: Multitask learning as question answering. arXiv preprint arXiv:1806.08730 (2018)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2015.58"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Tom\u00e1\u0161 Mikolov Martin Karafi\u00e1t Luk\u00e1\u0161 Burget Jan \u010cernock\u00fd and Sanjeev Khudanpur. 2010. Recurrent neural network based language model. In Eleventh annual conference of the international speech communication association.","DOI":"10.21437\/Interspeech.2010-343"},{"key":"e_1_3_2_1_42_1","unstructured":"Mozilla. 2012. Mozila Crash Reports . http:\/\/crash-stats.mozilla.com\/."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273582"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_45_1","volume-title":"Conference on empirical methods in natural language processing.","author":"Ratnaparkhi Adwait","year":"1996","unstructured":"Adwait Ratnaparkhi. 1996. A maximum entropy model for part-of-speech tagging. In Conference on empirical methods in natural language processing."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Hasim Sak Andrew W Senior and Fran\u00e7oise Beaufays. 2014. Long short-term memory recurrent neural network architectures for large scale acoustic modeling. (2014).","DOI":"10.21437\/Interspeech.2014-80"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463280"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Manish Shetty Chetan Bansal Sumit Kumar Nikitha Rao and Nachiappan Nagappan. 2021. SoftNER: Mining Knowledge Graphs From Cloud Incidents. arXiv:2101.05961 [cs.SE]","DOI":"10.1007\/s10664-022-10159-w"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00031"},{"volume-title":"Interspeech.","author":"Shinohara Yusuke","key":"e_1_3_2_1_50_1","unstructured":"Yusuke Shinohara. 2016. Adversarial Multi-Task Learning of Deep Neural Networks for Robust Speech Recognition.. In Interspeech. San Francisco, CA, USA, 2369--2372."},{"key":"e_1_3_2_1_51_1","volume-title":"Learning general purpose distributed sentence representations via large scale multi-task learning. arXiv preprint arXiv:1804.00079","author":"Subramanian Sandeep","year":"2018","unstructured":"Sandeep Subramanian, Adam Trischler, Yoshua Bengio, and Christopher J Pal. 2018. Learning general purpose distributed sentence representations via large scale multi-task learning. arXiv preprint arXiv:1804.00079 (2018)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Martin Sundermeyer Ralf Schl\u00fcter and Hermann Ney. 2012. LSTM neural networks for language modeling. In Thirteenth annual conference of the international speech communication association.","DOI":"10.21437\/Interspeech.2012-65"},{"key":"e_1_3_2_1_53_1","unstructured":"Ubuntu. 2008. Apport Crash Duplicates. https:\/\/wiki.ubuntu.com\/ApportCrashDuplicates."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238200"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3416505.3423561"},{"key":"e_1_3_2_1_56_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008."},{"key":"e_1_3_2_1_57_1","volume-title":"MulCode: A Multi-task Learning Approach for Source Code Understanding. In 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 48--59","author":"Wang Deze","year":"2021","unstructured":"Deze Wang, Yue Yu, Shanshan Li, Wei Dong, Ji Wang, and Liao Qing. 2021. MulCode: A Multi-task Learning Approach for Source Code Understanding. In 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 48--59."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.683"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610386"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178814"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2011.09.069"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3070203"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Pittsburgh Pennsylvania","acronym":"ICSE '22"},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3512759","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3512759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:24Z","timestamp":1750191144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3512759"}},"subtitle":["learning to localize crashes at scale"],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":62,"alternative-id":["10.1145\/3510003.3512759","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3512759","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}