{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:40:03Z","timestamp":1755852003805,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"vor","delay-in-days":87,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2120386, CCF-1723215, CCF-1723432, TWC- 1723198"],"award-info":[{"award-number":["CNS-2120386, CCF-1723215, CCF-1723432, TWC- 1723198"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["NCAE- C-002-2021"],"award-info":[{"award-number":["NCAE- C-002-2021"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3560434","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications"],"prefix":"10.1145","author":[{"given":"Hoan Anh","family":"Nguyen","sequence":"first","affiliation":[{"name":"Amazon, United States of America"}]},{"given":"Hung Dang","family":"Phan","sequence":"additional","affiliation":[{"name":"Computer Science, Iowa State University, United States of America"}]},{"given":"Samantha Syeda","family":"Khairunnesa","sequence":"additional","affiliation":[{"name":"Bradley University, USA"}]},{"given":"Son","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Computer Science, University of Texas at Dallas, United States of America"}]},{"given":"Aashish","family":"Yadavally","sequence":"additional","affiliation":[{"name":"Computer Science, University of Texas at Dallas, United States of America"}]},{"given":"Shaohua","family":"Wang","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, United States of America"}]},{"given":"Hridesh","family":"Rajan","sequence":"additional","affiliation":[{"name":"Computer Science, Iowa State University, United States of America"}]},{"given":"Tien","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Statgen. https:\/\/nguyenhoan.github.io\/statgen\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/966049.777394"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486822"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2369047"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568246"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025151"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213872"},{"volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering(ASE \u201910)","author":"L.","key":"e_1_3_2_1_9_1","unstructured":"Raymond\u00a0P.L. Buse and Westley\u00a0R. Weimer. 2010. Automatically Documenting Program Changes. In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering(ASE \u201910). ACM, 33\u201342."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the NAACL HLT 2010 Demonstration Session. Association for Computational Linguistics","author":"Cer Daniel","year":"2010","unstructured":"Daniel Cer, Michel Galley, Daniel Jurafsky, and Christopher\u00a0D. Manning. 2010. Phrasal: A Statistical Machine Translation Toolkit for Exploring New Model Features. In Proceedings of the NAACL HLT 2010 Demonstration Session. Association for Computational Linguistics, Los Angeles, California, 9\u201312."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327144.3327180"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882312"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302467"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453150"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568234"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931061"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering(FSE","author":"Gu Xiaodong","year":"2016","unstructured":"Xiaodong Gu, Hongyu Zhang, Dongmei Zhang, and Sunghun Kim. 2016 (To appear). Deep API Learning. In Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering(FSE 2016). ACM."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814295"},{"key":"e_1_3_2_1_21_1","unstructured":"Hideaki Hata Emad Shihab and Graham Neubig. 2018. Learning to Generate Corrective Patches using Neural Machine Translation. CoRR abs\/1812.07170(2018). arxiv:1812.07170http:\/\/arxiv.org\/abs\/1812.07170"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09730-9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Srini Iyer Ioannis Konstas Alvin Cheung and Luke Zettlemoyer. 2016. Summarizing Source Code using a Neural Attention Model. In ACL.","DOI":"10.18653\/v1\/P16-1195"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196330"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3115\/1075096.1075150"},{"key":"e_1_3_2_1_26_1","volume-title":"Statistical Machine Translation","author":"Koehn Philipp","unstructured":"Philipp Koehn. 2010. Statistical Machine Translation(1st ed.). Cambridge University Press, New York, NY, USA.","edition":"1"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 7th symposium on Operating systems design and implementation(OSDI \u201906)","author":"Kremenek Ted","year":"2006","unstructured":"Ted Kremenek, Paul Twohey, Godmar Back, Andrew Ng, and Dawson Engler. 2006. From uncertainty to belief: inferring the specification within. In Proceedings of the 7th symposium on Operating systems design and implementation(OSDI \u201906). USENIX Association, 161\u2013176."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635890"},{"volume-title":"2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 115\u2013125","author":"Le B.","key":"e_1_3_2_1_29_1","unstructured":"T.\u00a0B. Le, X.\u00a0D. Le, D. Lo, and I. Beschastnikh. 2015. Synergizing Specification Miners through Model Fissions and Fusions (T). In 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 115\u2013125."},{"key":"e_1_3_2_1_30_1","unstructured":"Tao Lei Fan Long Regina Barzilay and Martin\u00a0C. Rinard. 2013. From Natural Language Specifications to Program Input Parsers. In ACL."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081754"},{"volume-title":"QUARK: Empirical Assessment of Automaton-based Specification Miners. In 2006 13th Working Conference on Reverse Engineering. 51\u201360","author":"Lo D.","key":"e_1_3_2_1_33_1","unstructured":"D. Lo and S. Khoo. 2006. QUARK: Empirical Assessment of Automaton-based Specification Miners. In 2006 13th Working Conference on Reverse Engineering. 51\u201360."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181808"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859081"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595761"},{"key":"e_1_3_2_1_37_1","first-page":"9","article-title":"Learning Extended FSA from Software","volume":"85","author":"Lo David","year":"2012","unstructured":"David Lo, Leonardo Mariani, and Mauro Santoro. 2012. Learning Extended FSA from Software: An Empirical Assessment. J. Syst. Softw. 85, 9 (Sept. 2012), 2063\u20132076.","journal-title":"An Empirical Assessment. J. Syst. Softw."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2045"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.nlp4prog-1.1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.48"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635924"},{"volume-title":"FASE \u201909","author":"Nguyen A.","key":"e_1_3_2_1_43_1","unstructured":"H.\u00a0A. Nguyen, T.\u00a0T. Nguyen, N.\u00a0H. Pham, J.\u00a0M. Al-Kofahi, and T.\u00a0N. Nguyen. 2009. Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection. In FASE \u201909. Springer Verlag, 440\u2013455."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595767"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.36"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642988"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2017.9"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.60"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884808"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250749"},{"volume-title":"Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001. IEEE CS, 221\u2013230","author":"Reiss P.","key":"e_1_3_2_1_51_1","unstructured":"S.\u00a0P. Reiss and M. Renieris. 2001. Encoding program executions. In Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001. IEEE CS, 221\u2013230."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491426"},{"volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering(ASE \u201910)","author":"Sridhara Giriprasad","key":"e_1_3_2_1_53_1","unstructured":"Giriprasad Sridhara, Emily Hill, Divya Muppaneni, Lori Pollock, and K. Vijay-Shanker. 2010. Towards Automatically Generating Summary Comments for Java Methods. In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering(ASE \u201910). ACM, 43\u201352."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568313"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","unstructured":"Zeyu Sun Qihao Zhu Lili Mou Yingfei Xiong Ge Li and Lu Zhang. 2019. A Grammar-Based Structural CNN Decoder for Code Generation. In Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence (Honolulu Hawaii USA) (AAAI\u201919\/IAAI\u201919\/EAAI\u201919). AAAI Press Article 866 8\u00a0pages. https:\/\/doi.org\/10.1609\/aaai.v33i01.33017055","DOI":"10.1609\/aaai.v33i01.33017055"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6430"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.106"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.72"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00021"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.30"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287632"},{"volume-title":"Code Generation as a Dual Task of Code Summarization","author":"Wei Bolin","key":"e_1_3_2_1_62_1","unstructured":"Bolin Wei, Ge Li, Xin Xia, Zhiyi Fu, and Zhi Jin. 2019. Code Generation as a Dual Task of Code Summarization. Curran Associates Inc., Red Hook, NY, USA."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985820"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_30"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.63"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134325"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884881"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409716"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_15"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.11"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","acronym":"ASE '22","location":"Rochester MI USA"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3560434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3560434","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3560434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:59:24Z","timestamp":1755849564000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3560434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":71,"alternative-id":["10.1145\/3551349.3560434","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3560434","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}