{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:27:49Z","timestamp":1776119269659,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642239","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Ivie: Lightweight Anchored Explanations of Just-Generated Code"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5077-354X","authenticated-orcid":false,"given":"Litao","family":"Yan","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, University of Pennsylvania, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4827-8505","authenticated-orcid":false,"given":"Alyssa","family":"Hwang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Pennsylvania, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8016-5985","authenticated-orcid":false,"given":"Zhiyuan","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Pennsylvania, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1523-3347","authenticated-orcid":false,"given":"Andrew","family":"Head","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Pennsylvania, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"Proceedings of the International Conference on Automated Software Engineering. ACM, Article 205","author":"Al\u00a0Madi Naser","year":"2023","unstructured":"Naser Al\u00a0Madi. 2023. How Readable is Model-generated Code? Examining Readability and Visual Inspection of GitHub Copilot. In Proceedings of the International Conference on Automated Software Engineering. ACM, Article 205."},{"key":"e_1_3_3_3_2_1","unstructured":"[2] Amazon CodeWhisperer. Retrieved July 25 2023 from https:\/\/aws.amazon.com\/codewhisperer\/"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3586030"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582083"},{"key":"e_1_3_3_3_5_1","volume-title":"Qualitative HCI research: Going behind the scenes","author":"Blandford Ann","unstructured":"Ann Blandford, Dominic Furniss, and Stephann Makri. 2016. Qualitative HCI research: Going behind the scenes. Morgan & Claypool Publishers."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(83)80031-5"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807473"},{"key":"e_1_3_3_3_8_1","volume-title":"The Nurnberg funnel: Designing minimalist instruction for practical computer skill","author":"Carroll M","unstructured":"John\u00a0M Carroll. 1990. The Nurnberg funnel: Designing minimalist instruction for practical computer skill. MIT Press."},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8279.1992.tb01017.x"},{"key":"e_1_3_3_3_10_1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, 3205\u20133214","author":"Shih-Ping Chang Kerry","year":"2012","unstructured":"Kerry Shih-Ping Chang and Brad\u00a0A. Myers. 2012. WebCrystal: Understanding and Reusing Examples in Web Authoring. In Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, 3205\u20133214."},{"key":"e_1_3_3_3_11_1","unstructured":"[11] ChatGPT. Retrieved September 15 2023 from https:\/\/chat.openai.com"},{"key":"e_1_3_3_3_12_1","unstructured":"[12] Codeium.Retrieved July 25 2023 from https:\/\/marketplace.visualstudio.com\/items?itemName=Codeium.codeium"},{"key":"e_1_3_3_3_13_1","unstructured":"William\u00a0Perry Crichton. 2022. Revisiting Program Slicing with Ownership-Based Information Flow. Ph.\u00a0D. Dissertation."},{"key":"e_1_3_3_3_14_1","volume-title":"Software Design\u2013Cognitive Aspects","author":"D\u00e9tienne Fran\u00e7oise","unstructured":"Fran\u00e7oise D\u00e9tienne. 2001. Software Design\u2013Cognitive Aspects. Springer Science & Business Media."},{"key":"e_1_3_3_3_15_1","volume-title":"Retrieved","author":"Dohmke Thomas","year":"2022","unstructured":"Thomas Dohmke. 2022. GitHub Copilot is generally available to all developers. Retrieved July 25, 2023 from https:\/\/github.blog\/2022-06-21-github-copilot-is-generally-available-to-all-developers\/"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227187"},{"key":"e_1_3_3_3_17_1","unstructured":"[17] EasyCode. Retrieved July 25 2023 from https:\/\/www.easycode.ai\/"},{"key":"e_1_3_3_3_18_1","unstructured":"Kasra Ferdowsi Ruanqianqian Huang Michael\u00a0B. James Nadia Polikarpova and Sorin Lerner. 2023. Live Exploration of AI-Generated Programs. (2023). arxiv:2306.09541\u00a0[cs.HC]"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568266"},{"key":"e_1_3_3_3_20_1","unstructured":"[20] Genie AI. Retrieved July 25 2023 from https:\/\/marketplace.visualstudio.com\/items?itemName=genieai.chatgpt-vscode"},{"key":"e_1_3_3_3_21_1","unstructured":"[21] GitHub Copilot X. Retrieved July 25 2023 from https:\/\/github.com\/features\/preview\/copilot-x"},{"key":"e_1_3_3_3_22_1","volume-title":"Retrieved","author":"Your GitHub","year":"2023","unstructured":"[22] GitHub Copilot \u00b7 Your AI pair programmer. Retrieved July 25, 2023 from https:\/\/github.com\/features\/copilot"},{"key":"e_1_3_3_3_23_1","unstructured":"[23] GitHub Next | Code Brushes. Retrieved September 10 2023 from https:\/\/githubnext.com\/projects\/code-brushes\/"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174154"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2015.7356972"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984570"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174106"},{"key":"e_1_3_3_3_28_1","volume-title":"A simple sequentially rejective multiple test procedure. Scandinavian journal of statistics","author":"Holm Sture","year":"1979","unstructured":"Sture Holm. 1979. A simple sequentially rejective multiple test procedure. Scandinavian journal of statistics (1979), 65\u201370."},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502095"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545667"},{"key":"e_1_3_3_3_31_1","volume-title":"Article 17 (November","author":"Kather Philipp","year":"2021","unstructured":"Philipp Kather, Rodrigo Duran, and Jan Vahrenhold. 2021. Through (Tracking) Their Eyes: Abstraction and Complexity in Program Comprehension. ACM Transactions on Computing Education, Article 17 (November 2021)."},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.45"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376494"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3608128"},{"key":"e_1_3_3_3_35_1","volume-title":"Proceedings of Koli Calling International Conference on Computing Education Research. ACM, Article 8.","author":"Liffiton Mark","year":"2024","unstructured":"Mark Liffiton, Brad\u00a0E. Sheese, Jaromir Savelka, and Paul Denny. 2024. CodeHelp: Using Large Language Models with Guardrails for Scalable Support in Programming Classes. In Proceedings of Koli Calling International Conference on Computing Education Research. ACM, Article 8."},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"crossref","unstructured":"Hussein Mozannar Gagan Bansal Adam Fourney and Eric Horvitz. 2024. Reading Between the Lines: Modeling User Behavior and Costs in AI-Assisted Programming. (2024). To appear.","DOI":"10.1145\/3613904.3641936"},{"key":"e_1_3_3_3_37_1","volume-title":"Proceedings of the International Conference on Software Engineering. ACM, 448\u2013451","author":"Nakagawa Takao","year":"2014","unstructured":"Takao Nakagawa, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Kenichi Matsumoto, and Daniel\u00a0M. German. 2014. Quantifying programmers\u2019 mental workload during program comprehension based on cerebral blood flow measurement: A controlled experiment. In Proceedings of the International Conference on Software Engineering. ACM, 448\u2013451."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639187"},{"key":"e_1_3_3_3_39_1","volume-title":"Proceedings of the CHI conference on Human Factors in Computing Systems. ACM, 152\u2013158","author":"Nielsen Jakob","year":"1994","unstructured":"Jakob Nielsen. 1994. Enhancing the explanatory power of usability heuristics. In Proceedings of the CHI conference on Human Factors in Computing Systems. ACM, 152\u2013158."},{"key":"e_1_3_3_3_41_1","unstructured":"[41] OpenCV. Retrieved September 15 2023 from https:\/\/opencv.org\/"},{"key":"e_1_3_3_3_42_1","volume-title":"Sociological methods","author":"Orne T","unstructured":"Martin\u00a0T Orne. 2017. On the social psychology of the psychological experiment: With particular reference to demand characteristics and their implications. In Sociological methods. Routledge, 279\u2013299."},{"key":"e_1_3_3_3_43_1","volume-title":"Stimulus structures and mental representations in expert comprehension of computer programs. Cognitive psychology 19, 3","author":"Pennington Nancy","year":"1987","unstructured":"Nancy Pennington. 1987. Stimulus structures and mental representations in expert comprehension of computer programs. Cognitive psychology 19, 3 (1987), 295\u2013341."},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563835.3567654"},{"key":"e_1_3_3_3_45_1","unstructured":"[45] PyGame. Retrieved September 15 2023 from https:\/\/www.pygame.org"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9150-8"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786855"},{"key":"e_1_3_3_3_48_1","volume-title":"An approximate distribution of estimates of variance components. Biometrics bulletin 2, 6","author":"Satterthwaite E.","year":"1946","unstructured":"Franklin\u00a0E. Satterthwaite. 1946. An approximate distribution of estimates of variance components. Biometrics bulletin 2, 6 (1946), 110\u2013114."},{"key":"e_1_3_3_3_49_1","volume-title":"Shaft and Iris Vessey","author":"M.","year":"1995","unstructured":"Teresa\u00a0M. Shaft and Iris Vessey. 1995. The Relevance of Application Domain Knowledge: The Case of Computer Program Comprehension. Information systems research 6, 3 (1995), 286\u2013299."},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.41"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00975629"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00977789"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568252"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181779"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010283"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417058"},{"key":"e_1_3_3_3_57_1","volume-title":"Proceedings of the Annual Workshop at the Intersection of PL and HCI.","author":"Tang Ningzhi","year":"2023","unstructured":"Ningzhi Tang, Meng Chen, Zheng Ning, Aakash Bansal, Yu Huang, Collin McMillan, and Toby Jia-Jun Li. 2023. An Empirical Study of Developer Behaviors for Validating and Repairing AI-Generated Code. In Proceedings of the Annual Workshop at the Intersection of PL and HCI."},{"key":"e_1_3_3_3_58_1","unstructured":"[58] TLX @ NASA Ames - Home. Retrieved September 15 2023 from https:\/\/humansystems.arc.nasa.gov\/groups\/TLX\/"},{"key":"e_1_3_3_3_59_1","volume-title":"Retrieved","year":"2023","unstructured":"Tobii. Enter the world of eye tracking with Tobii Pro Spark - Tobii. Retrieved September 15, 2023 from https:\/\/www.tobii.com\/products\/eye-trackers\/screen-based\/tobii-pro-spark"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.80"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519665"},{"key":"e_1_3_3_3_62_1","unstructured":"[62] Visual Studio Code. Retrieved September 15 2023 from https:\/\/code.visualstudio.com\/"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1993.263903"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.68"},{"key":"e_1_3_3_3_65_1","volume-title":"Breakthroughs in Statistics: Methodology and Distribution","author":"Wilcoxon Frank","unstructured":"Frank Wilcoxon. 1992. Individual comparisons by ranking methods. In Breakthroughs in Statistics: Methodology and Distribution. Springer, 196\u2013202."},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2734091"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487569"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445654"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545647"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:24Z","timestamp":1750290264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":68,"alternative-id":["10.1145\/3613904.3642239","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642239","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}