{"id":"https://openalex.org/W2898157037","doi":"https://doi.org/10.1145/3283812.3283819","title":"A fine-grained approach for automated conversion of JUnit assertions to English","display_name":"A fine-grained approach for automated conversion of JUnit assertions to English","publication_year":2018,"publication_date":"2018-10-24","ids":{"openalex":"https://openalex.org/W2898157037","doi":"https://doi.org/10.1145/3283812.3283819","mag":"2898157037"},"language":"en","primary_location":{"id":"doi:10.1145/3283812.3283819","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3283812.3283819","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3283812.3283819","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3283812.3283819","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Danielle Gonzalez","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Danielle Gonzalez","raw_affiliation_strings":["Rochester Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Suzanne Prentice","orcid":null},"institutions":[{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Suzanne Prentice","raw_affiliation_strings":["University of South Carolina, USA"],"affiliations":[{"raw_affiliation_string":"University of South Carolina, USA","institution_ids":["https://openalex.org/I155781252"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mehdi Mirakhorli","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mehdi Mirakhorli","raw_affiliation_strings":["Rochester Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":1.2243,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82401283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"14","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/automatic-summarization","display_name":"Automatic summarization","score":0.829200029373169},{"id":"https://openalex.org/keywords/unit-testing","display_name":"Unit testing","score":0.7473000288009644},{"id":"https://openalex.org/keywords/assertion","display_name":"Assertion","score":0.5795000195503235},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5098999738693237},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.4790000021457672},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.45669999718666077},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4388999938964844},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.42289999127388},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.41940000653266907}],"concepts":[{"id":"https://openalex.org/C170858558","wikidata":"https://www.wikidata.org/wiki/Q1394144","display_name":"Automatic summarization","level":2,"score":0.829200029373169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7789999842643738},{"id":"https://openalex.org/C148027188","wikidata":"https://www.wikidata.org/wiki/Q907375","display_name":"Unit testing","level":3,"score":0.7473000288009644},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6868000030517578},{"id":"https://openalex.org/C40422974","wikidata":"https://www.wikidata.org/wiki/Q741248","display_name":"Assertion","level":2,"score":0.5795000195503235},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5098999738693237},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.4790000021457672},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.45669999718666077},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4388999938964844},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.42289999127388},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.42239999771118164},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.40290001034736633},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39340001344680786},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39320001006126404},{"id":"https://openalex.org/C10272871","wikidata":"https://www.wikidata.org/wiki/Q929972","display_name":"Software inspection","level":5,"score":0.38960000872612},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.33469998836517334},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.320499986410141},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.30230000615119934},{"id":"https://openalex.org/C16910744","wikidata":"https://www.wikidata.org/wiki/Q7705759","display_name":"Test data","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.29809999465942383},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.2687000036239624},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.267300009727478},{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.2621999979019165},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C32833848","wikidata":"https://www.wikidata.org/wiki/Q4115054","display_name":"Extensibility","level":2,"score":0.25360000133514404},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2531999945640564}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3283812.3283819","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3283812.3283819","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3283812.3283819","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1811.05005","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1811.05005","pdf_url":"https://arxiv.org/pdf/1811.05005","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.5281/zenodo.1482012","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.1482012","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"doi:10.5281/zenodo.1482013","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.1482013","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1145/3283812.3283819","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3283812.3283819","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3283812.3283819","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8657618014","display_name":null,"funder_award_id":"CNS-1823246","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2898157037.pdf"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1970407057","https://openalex.org/W2082160726","https://openalex.org/W2084669353","https://openalex.org/W2123442489","https://openalex.org/W2136296681","https://openalex.org/W2140183398","https://openalex.org/W2214958829"],"related_works":[],"abstract_inverted_index":{"Converting":[0],"source":[1],"or":[2,150],"unit":[3],"test":[4,46,68,87],"code":[5,148],"to":[6,11,33,102],"English":[7,36,132],"has":[8,114],"been":[9,116],"shown":[10,127],"improve":[12],"the":[13,28,54,60,73,109,121],"maintainability,":[14],"understandability,":[15],"and":[16,20,30,41,56,118],"analysis":[17,40],"of":[18,53,67,75,97,108,140],"software":[19],"tests.":[21],"Code":[22],"summarizers":[23],"identify":[24],"'important'":[25],"statements":[26,142],"in":[27,59],"source/tests":[29],"convert":[31],"them":[32],"easily":[34],"understood":[35],"sentences":[37],"using":[38],"static":[39],"NLP":[42,152],"techniques.":[43],"However,":[44],"current":[45],"summarization":[47,88,149],"approaches":[48],"handle":[49],"only":[50],"a":[51,90,95,137],"subset":[52],"variation":[55],"customization":[57],"allowed":[58],"JUnit":[61,86,100],"assert":[62],"API":[63],"(a":[64],"critical":[65],"component":[66],"cases)":[69],"which":[70,143],"may":[71],"affect":[72],"accuracy":[74],"conversions.":[76],"In":[77],"this":[78,129],"paper,":[79],"we":[80],"present":[81],"our":[82],"work":[83],"towards":[84],"improving":[85],"with":[89],"detailed":[91],"process":[92,113],"for":[93,147],"converting":[94],"total":[96],"45":[98],"unique":[99],"assertions":[101],"English,":[103],"including":[104],"37":[105],"previously-unhandled":[106],"variations":[107],"assertThat":[110],"method.":[111],"This":[112],"also":[115],"implemented":[117],"released":[119],"as":[120],"AssertConvert":[122],"tool.":[123],"Initial":[124],"evaluations":[125],"have":[126],"that":[128,134],"tool":[130],"generates":[131],"conversions":[133],"accurately":[135],"represent":[136],"wide":[138],"variety":[139],"assertion":[141],"could":[144],"be":[145],"used":[146],"other":[151],"analyses.":[153]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2018-11-02T00:00:00"}
