{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T10:16:45Z","timestamp":1772533005417,"version":"3.50.1"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:00:00Z","timestamp":1695945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002125 and 61932021"],"award-info":[{"award-number":["62002125 and 61932021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2021QNRC001"],"award-info":[{"award-number":["2021QNRC001"]}]},{"name":"European Research Council (ERC) under the European Union\u2019s Horizon 2020 research and innovation programme","award":["949014"],"award-info":[{"award-number":["949014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>\n            Method naming is a challenging development task in object-oriented programming. In recent years, several research efforts have been undertaken to provide automated tool support for assisting developers in this task. In general, literature approaches assume the availability of method implementation to infer its name. Methods, however, are usually named before their implementations. In this work, we fill the gap in the literature about method name prediction by developing an approach that predicts the names of all methods to be implemented within a class. Our work considers the class name as the input: The overall intuition is that classes with semantically similar names tend to provide similar functionalities, and hence similar method names. We first conduct a large-scale empirical analysis on 258K+ classes from real-world projects to validate our hypotheses. Then, we propose a hybrid big code-driven approach,\n            <jats:monospace>Mario<\/jats:monospace>\n            , to predict method names based on the class name: We combine a deep learning model with heuristics summarized from code analysis. Extensive experiments on 22K+ classes yielded promising results: compared to the state-of-the-art code2seq model (which leverages method implementation data), our approach achieves comparable results in terms of F-score at token-level prediction; our approach, additionally, outperforms code2seq in prediction at the name level. We further show that our approach significantly outperforms several other baselines.\n          <\/jats:p>","DOI":"10.1145\/3597203","type":"journal-article","created":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T11:15:54Z","timestamp":1683976554000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Pre-implementation Method Name Prediction for Object-oriented Programming"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1469-2063","authenticated-orcid":false,"given":"Shangwen","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5588-9618","authenticated-orcid":false,"given":"Ming","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5905-4677","authenticated-orcid":false,"given":"Bo","family":"Lin","sequence":"additional","affiliation":[{"name":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8147-8126","authenticated-orcid":false,"given":"Yepang","family":"Liu","sequence":"additional","affiliation":[{"name":"Research Institute of Trustworthy Autonoumous Systems and Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7270-9869","authenticated-orcid":false,"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4204-7424","authenticated-orcid":false,"given":"Xiaoguang","family":"Mao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science, National University of Defense Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,29]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Jordan Brown. 2022. 15 Java Coding Best Practices. Retrieved from https:\/\/xperti.io\/blogs\/java-coding-best-practices\/."},{"key":"e_1_3_2_3_2","unstructured":"Eclipse Foundation. 2022. Eclipse Foundation. Retrieved from https:\/\/www.eclipse.org\/."},{"key":"e_1_3_2_4_2","unstructured":"Martin O\u2019Connor. 2022. Java Tutorial - How To Write A Method. Retrieved from https:\/\/www.youtube.com\/watch?v=qQDGYfQPpGg."},{"key":"e_1_3_2_5_2","unstructured":"NLTK. 2022. Stanford CoreNLP. Retrieved from https:\/\/github.com\/nltk\/nltk\/wiki\/Stanford-CoreNLP-API-in-NLTK."},{"key":"e_1_3_2_6_2","unstructured":"Margaret Reid-Miller. 2022. Writing New Java Classes. Retrieved from https:\/\/www.cs.cmu.edu\/mrmiller\/15-110\/Handouts\/writingClasses.pdf."},{"key":"e_1_3_2_7_2","first-page":"95","volume-title":"Proceedings of the 16th Working Conference on Reverse Engineering","author":"Abebe Surafel Lemma","year":"2009","unstructured":"Surafel Lemma Abebe, Sonia Haiduc, Paolo Tonella, and Andrian Marcus. 2009. Lexicon bad smells in software. In Proceedings of the 16th Working Conference on Reverse Engineering. IEEE, 95\u201399."},{"key":"e_1_3_2_8_2","first-page":"156","volume-title":"Proceedings of the IEEE 18th International Conference on Program Comprehension","author":"Abebe Surafel Lemma","year":"2010","unstructured":"Surafel Lemma Abebe and Paolo Tonella. 2010. Natural language parsing of program element names for concept extraction. In Proceedings of the IEEE 18th International Conference on Program Comprehension. IEEE, 156\u2013159."},{"key":"e_1_3_2_9_2","first-page":"77","volume-title":"Proceedings of the 18th Working Conference on Reverse Engineering","author":"Abebe Surafel Lemma","year":"2011","unstructured":"Surafel Lemma Abebe and Paolo Tonella. 2011. Towards the extraction of domain concepts from the identifiers. In Proceedings of the 18th Working Conference on Reverse Engineering. IEEE, 77\u201386."},{"key":"e_1_3_2_10_2","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL)","author":"Ahmad Wasi Uddin","year":"2020","unstructured":"Wasi Uddin Ahmad, Saikat Chakraborty, Baishakhi Ray, and Kai-Wei Chang. 2020. A transformer-based approach for source code summarization. In Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL)."},{"issue":"6","key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1109\/TSE.2010.97","article-title":"Measuring the discriminative power of object-oriented class cohesion metrics","volume":"37","author":"Dallal Jehad Al","year":"2010","unstructured":"Jehad Al Dallal. 2010. Measuring the discriminative power of object-oriented class cohesion metrics. IEEE Trans. Softw. Eng. 37, 6 (2010), 788\u2013804.","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"11","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.infsof.2013.07.005","article-title":"Object-oriented class maintainability prediction using internal quality attributes","volume":"55","author":"Dallal Jehad Al","year":"2013","unstructured":"Jehad Al Dallal. 2013. Object-oriented class maintainability prediction using internal quality attributes. Inf. Softw. Technol. 55, 11 (2013), 2028\u20132048.","journal-title":"Inf. Softw. Technol."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"e_1_3_2_16_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Allamanis Miltiadis","year":"2018","unstructured":"Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2018. Learning to represent programs with graphs. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net."},{"key":"e_1_3_2_17_2","first-page":"2091","volume-title":"Proceedings of the 33rd International Conference on Machine Learning","author":"Allamanis Miltiadis","year":"2016","unstructured":"Miltiadis Allamanis, Hao Peng, and Charles Sutton. 2016. A convolutional attention network for extreme summarization of source code. In Proceedings of the 33rd International Conference on Machine Learning. JMLR.org, 2091\u20132100."},{"key":"e_1_3_2_18_2","volume-title":"Proceedings of the 7th International Conference on Learning Representations","author":"Alon Uri","year":"2019","unstructured":"Uri Alon, Shaked Brody, Omer Levy, and Eran Yahav. 2019. code2seq: Generating sequences from structured representations of code. In Proceedings of the 7th International Conference on Learning Representations. OpenReview.net."},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_20_2","first-page":"587","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"Alsuhaibani Reem S.","year":"2021","unstructured":"Reem S. Alsuhaibani, Christian D. Newman, M. J. Decker, Michael L. Collard, and J. Maletic. 2021. On the naming of methods: A survey of professional developers. In Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 587\u2013599."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9350-8"},{"key":"e_1_3_2_22_2","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/CSMR.2013.28","article-title":"A new family of software anti-patterns: Linguistic anti-patterns","author":"Arnaoudova Venera","year":"2013","unstructured":"Venera Arnaoudova, Massimiliano Di Penta, Giuliano Antoniol, and Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc. 2013. A new family of software anti-patterns: Linguistic anti-patterns. In Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 187\u2013196.","journal-title":"Proceedings of the 17th European Conference on Software Maintenance and Reengineering"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9201-4"},{"key":"e_1_3_2_24_2","first-page":"158","volume-title":"Proceedings of the IEEE 17th International Conference on Program Comprehension","author":"Binkley Dave","year":"2009","unstructured":"Dave Binkley, Marcia Davis, Dawn Lawrie, and Christopher Morrell. 2009. To camelcase or under_score. In Proceedings of the IEEE 17th International Conference on Program Comprehension. IEEE, 158\u2013167."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985471"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595728"},{"key":"e_1_3_2_27_2","volume-title":"Proceedings of the 35th AAAI Conference on Artificial Intelligence","author":"Bui Nghi D. Q.","year":"2021","unstructured":"Nghi D. Q. Bui, Yijun Yu, and Lingxiao Jiang. 2021. TreeCaps: Tree-based capsule networks for source code processing. In Proceedings of the 35th AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_28_2","first-page":"41","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Butler Simon","year":"2015","unstructured":"Simon Butler, Michel Wermelinger, and Yijun Yu. 2015. Investigating naming convention adherence in Java references. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 41\u201350."},{"key":"e_1_3_2_29_2","first-page":"196","volume-title":"Proceedings of the IEEE 23rd International Conference on Program Comprehension","author":"Butler Simon","year":"2015","unstructured":"Simon Butler, Michel Wermelinger, and Yijun Yu. 2015. A survey of the forms of Java reference names. In Proceedings of the IEEE 23rd International Conference on Program Comprehension. IEEE, 196\u2013206."},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080776"},{"key":"e_1_3_2_31_2","first-page":"112","volume-title":"Proceedings of the 6th Working Conference on Reverse Engineering","author":"Caprile C.","year":"1999","unstructured":"C. Caprile and Paolo Tonella. 1999. Nomen est omen: Analyzing the language of function identifiers. In Proceedings of the 6th Working Conference on Reverse Engineering. IEEE, 112\u2013122."},{"key":"e_1_3_2_32_2","unstructured":"Norman Cliff. 1996. Ordinal methods for behavioral data analysis. https:\/\/www.taylorfrancis.com\/books\/mono\/10.4324\/9781315806730\/ordinal-methods-behavioral-data-analysis-norman-cliff."},{"key":"e_1_3_2_33_2","first-page":"233","volume-title":"Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM)","author":"Corazza Anna","year":"2012","unstructured":"Anna Corazza, Sergio Di Martino, and Valerio Maggio. 2012. LINSEN: An efficient approach to split identifiers and expand abbreviations. In Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM). IEEE, 233\u2013242."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-9219-1"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n19-1423"},{"key":"e_1_3_2_36_2","first-page":"71","volume-title":"Proceedings of the 6th IEEE International Working Conference on Mining Software Repositories","author":"Enslen Eric","year":"2009","unstructured":"Eric Enslen, Emily Hill, Lori Pollock, and K. Vijay-Shanker. 2009. Mining source code to automatically split identifiers for software analysis. In Proceedings of the 6th IEEE International Working Conference on Mining Software Repositories. IEEE, 71\u201380."},{"issue":"8","key":"e_1_3_2_37_2","first-page":"1559","article-title":"The impact of mislabeled changes by SZZ on just-in-time defect prediction","volume":"47","author":"Fan Yuanrui","year":"2019","unstructured":"Yuanrui Fan, Xin Xia, Daniel Alencar Da Costa, David Lo, Ahmed E. Hassan, and Shanping Li. 2019. The impact of mislabeled changes by SZZ on just-in-time defect prediction. IEEE Trans. Softw. Eng. 47, 8 (2019), 1559\u20131586.","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen:20070112"},{"key":"e_1_3_2_39_2","volume-title":"Proceedings of the IEEE\/ACM 31st International Conference on Program Comprehension (ICPC)","author":"Geng Mingyang","year":"2023","unstructured":"Mingyang Geng, Shangwen Wang, Dezun Dong, Haotian Wang, Shaomeng Cao, Kechi Zhang, and Zhi Jin. 2023. Interpretation-based code summarization. In Proceedings of the IEEE\/ACM 31st International Conference on Program Comprehension (ICPC)."},{"key":"e_1_3_2_40_2","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1145\/1985793.1985988","volume-title":"Proceedings of the 33rd International Conference on Software Engineering","author":"Gethers Malcom","year":"2011","unstructured":"Malcom Gethers, Trevor Savage, Massimiliano Di Penta, Rocco Oliveto, Denys Poshyvanyk, and Andrea De Lucia. 2011. CodeTopics: Which topic am I coding now? In Proceedings of the 33rd International Conference on Software Engineering. 1034\u20131036."},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094819"},{"key":"e_1_3_2_42_2","article-title":"Learning word vectors for 157 languages","author":"Grave Edouard","year":"2018","unstructured":"Edouard Grave, Piotr Bojanowski, Prakhar Gupta, Armand Joulin, and Tomas Mikolov. 2018. Learning word vectors for 157 languages. arXiv preprint arXiv:1802.06893 (2018).","journal-title":"arXiv preprint arXiv:1802.06893"},{"key":"e_1_3_2_43_2","first-page":"3","volume-title":"Proceedings of the 21st International Conference on Program Comprehension (ICPC)","author":"Gupta Samir","year":"2013","unstructured":"Samir Gupta, Sana Malik, Lori Pollock, and K. Vijay-Shanker. 2013. Part-of-speech tagging of program identifiers for improved text-based software engineering tools. In Proceedings of the 21st International Conference on Program Comprehension (ICPC). IEEE, 3\u201312."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/2.881692"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.13"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454045"},{"key":"e_1_3_2_47_2","first-page":"763","volume-title":"Proceedings of the 11th Joint Meeting on Foundations of Software Engineering","author":"Hellendoorn Vincent J.","year":"2017","unstructured":"Vincent J. Hellendoorn and Premkumar Devanbu. 2017. Are deep neural networks the best choice for modeling source code? In Proceedings of the 11th Joint Meeting on Foundations of Software Engineering. 763\u2013773."},{"key":"e_1_3_2_48_2","volume-title":"Proceedings of the 8th International Conference on Learning Representations (ICLR)","author":"Hellendoorn Vincent J.","year":"2020","unstructured":"Vincent J. Hellendoorn, Charles Sutton, Rishabh Singh, Petros Maniatis, and David Bieber. 2020. Global relational models of source code. In Proceedings of the 8th International Conference on Learning Representations (ICLR). OpenReview.net."},{"key":"e_1_3_2_49_2","first-page":"222","volume-title":"Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM)","author":"Higo Yoshiki","year":"2012","unstructured":"Yoshiki Higo and Shinji Kusumoto. 2012. How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments. In Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM). IEEE, 222\u2013231."},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9261-0"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100115"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_14"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00062"},{"key":"e_1_3_2_55_2","first-page":"1073","volume-title":"Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE)","author":"Karampatsis Rafael-Michael","year":"2020","unstructured":"Rafael-Michael Karampatsis, Hlib Babii, Romain Robbes, Charles Sutton, and Andrea Janes. 2020. Big code!= big vocabulary: Open-vocabulary models for source code. In Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 1073\u20131085."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9369-5"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00026"},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Pavneet Singh Kochhar Eirini Kalliamvakou Nachiappan Nagappan Thomas Zimmermann and Christian Bird. 2019. Moving from closed to open source: Observations from six transitioned projects to github. IEEE Transactions on Software Engineering 47 9 (2019) 1838\u20131856.","DOI":"10.1109\/TSE.2019.2937025"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00060"},{"key":"e_1_3_2_60_2","first-page":"36","volume-title":"Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension (ICPC)","author":"Lin Bo","year":"2021","unstructured":"Bo Lin, Shangwen Wang, Kui Liu, Xiaoguang Mao, and Tegawend\u00e9 F. Bissyand\u00e9. 2021. Automated comment update: How far are we? In Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension (ICPC). 36\u201346."},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3185458"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3505247"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416591"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110547"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00019"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133908"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730491"},{"key":"e_1_3_2_68_2","first-page":"23","volume-title":"Proceedings of the 21st International Conference on Program Comprehension (ICPC)","author":"Moreno Laura","year":"2013","unstructured":"Laura Moreno, Jairo Aponte, Giriprasad Sridhara, Andrian Marcus, Lori Pollock, and K. Vijay-Shanker. 2013. Automatic generation of natural language summaries for Java classes. In Proceedings of the 21st International Conference on Program Comprehension (ICPC). IEEE, 23\u201332."},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380926"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.5555\/1379052.1379053"},{"key":"e_1_3_2_72_2","first-page":"483","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Olney Wyatt","year":"2016","unstructured":"Wyatt Olney, Emily Hill, Chris Thurber, and Bezalem Lemma. 2016. Part of speech tagging Java method names. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 483\u2013487."},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.17"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.5555\/580131.857012"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606629"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.12"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0064-x"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"issue":"6","key":"e_1_3_2_79_2","first-page":"7889","article-title":"A survey on automatic text summarization","volume":"5","author":"Saranyamol C. S.","year":"2014","unstructured":"C. S. Saranyamol and L. Sindhu. 2014. A survey on automatic text summarization. Int. J. Comput. Sci. Inf. Technol. 5, 6 (2014), 7889\u20137893.","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"e_1_3_2_80_2","first-page":"67","volume-title":"Proceedings of the 8th IEEE International Working Conference on Source Code Analysis and Manipulation","author":"Singer Jeremy","year":"2008","unstructured":"Jeremy Singer and Chris Kirkham. 2008. Exploiting the correspondence between micro patterns and class names. In Proceedings of the 8th IEEE International Working Conference on Source Code Analysis and Manipulation. IEEE, 67\u201376."},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884800"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635875"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00021"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340544"},{"key":"e_1_3_2_85_2","first-page":"6000","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 6000\u20136010."},{"key":"e_1_3_2_86_2","article-title":"Beep: Fine-grained fix localization by learning to predict buggy code elements","author":"Wang Shangwen","year":"2021","unstructured":"Shangwen Wang, Kui Liu, Bo Lin, Li Li, Jacques Klein, Xiaoguang Mao, and Tegawend\u00e9 F. Bissyand\u00e9. 2021. Beep: Fine-grained fix localization by learning to predict buggy code elements. arXiv preprint arXiv:2111.07739 (2021).","journal-title":"arXiv preprint arXiv:2111.07739"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468567"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00025"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110639"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.704"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597203","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:06Z","timestamp":1750182546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,29]]},"references-count":91,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3597203"],"URL":"https:\/\/doi.org\/10.1145\/3597203","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,29]]},"assertion":[{"value":"2022-05-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-28","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}