{"id":"https://openalex.org/W3088434905","doi":"https://doi.org/10.1145/3387940.3392171","title":"Using API-Embedding for API-Misuse Repair","display_name":"Using API-Embedding for API-Misuse Repair","publication_year":2020,"publication_date":"2020-06-27","ids":{"openalex":"https://openalex.org/W3088434905","doi":"https://doi.org/10.1145/3387940.3392171","mag":"3088434905"},"language":"en","primary_location":{"id":"doi:10.1145/3387940.3392171","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3387940.3392171","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081710576","display_name":"Sebastian Nielebock","orcid":"https://orcid.org/0000-0002-0147-3526"},"institutions":[{"id":"https://openalex.org/I4210138551","display_name":"University Hospital Magdeburg","ror":"https://ror.org/03m04df46","country_code":"DE","type":"healthcare","lineage":["https://openalex.org/I4210138551"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Nielebock","raw_affiliation_strings":["University of Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Magdeburg, Germany","institution_ids":["https://openalex.org/I4210138551"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065580086","display_name":"Robert Heum\u00fcller","orcid":"https://orcid.org/0000-0002-9906-0323"},"institutions":[{"id":"https://openalex.org/I4210138551","display_name":"University Hospital Magdeburg","ror":"https://ror.org/03m04df46","country_code":"DE","type":"healthcare","lineage":["https://openalex.org/I4210138551"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Robert Heum\u00fcller","raw_affiliation_strings":["University of Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Magdeburg, Germany","institution_ids":["https://openalex.org/I4210138551"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042728295","display_name":"Jacob Kr\u00fcger","orcid":"https://orcid.org/0000-0002-0283-248X"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jacob Kr\u00fcger","raw_affiliation_strings":["University of Toronto &amp; University of Magdeburg, Canada &amp; Germany"],"affiliations":[{"raw_affiliation_string":"University of Toronto &amp; University of Magdeburg, Canada &amp; Germany","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022743752","display_name":"Frank Ortmeier","orcid":"https://orcid.org/0000-0001-6186-4142"},"institutions":[{"id":"https://openalex.org/I4210138551","display_name":"University Hospital Magdeburg","ror":"https://ror.org/03m04df46","country_code":"DE","type":"healthcare","lineage":["https://openalex.org/I4210138551"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frank Ortmeier","raw_affiliation_strings":["University of Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Magdeburg, Germany","institution_ids":["https://openalex.org/I4210138551"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081710576"],"corresponding_institution_ids":["https://openalex.org/I4210138551"],"apc_list":null,"apc_paid":null,"fwci":0.5338,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75186759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.852912187576294},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.7909992933273315},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5947873592376709},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5746355652809143},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5325661301612854},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48661884665489197},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4832206964492798},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36114251613616943},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.35103750228881836},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.23869436979293823},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22483453154563904},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.12385126948356628}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.852912187576294},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.7909992933273315},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5947873592376709},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5746355652809143},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5325661301612854},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48661884665489197},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4832206964492798},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36114251613616943},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.35103750228881836},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23869436979293823},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22483453154563904},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.12385126948356628},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3387940.3392171","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3387940.3392171","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5465694891","display_name":null,"funder_award_id":"SA 465/49-3","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1967878152","https://openalex.org/W2108632968","https://openalex.org/W2142403498","https://openalex.org/W2295399529","https://openalex.org/W2357927175","https://openalex.org/W2619465136","https://openalex.org/W2768057724","https://openalex.org/W2954709499","https://openalex.org/W2963900765"],"related_works":["https://openalex.org/W4367365664","https://openalex.org/W4385326140","https://openalex.org/W4293227618","https://openalex.org/W2136634148","https://openalex.org/W3122851392","https://openalex.org/W3122800671","https://openalex.org/W4250708772","https://openalex.org/W4288862737","https://openalex.org/W1984769753","https://openalex.org/W2049082574"],"abstract_inverted_index":{"Application":[0],"Programming":[1],"Interfaces":[2],"(APIs)":[3],"are":[4,96],"a":[5,27,65,99,114],"way":[6],"to":[7,19,59,110,128,134],"reuse":[8],"existing":[9],"functionalities":[10],"of":[11,26,77,85,101,123],"one":[12,147],"application":[13],"in":[14],"another":[15],"one.":[16],"However,":[17],"due":[18],"lacking":[20],"knowledge":[21],"on":[22,82,90],"the":[23,55,69,72,83,86,91,104,121,156],"correct":[24,105],"usage":[25,49,62,87,106],"particular":[28,148],"API,":[29],"developers":[30],"sometimes":[31],"commit":[32],"misuses,":[33],"causing":[34],"unintended":[35],"or":[36],"faulty":[37],"behavior.":[38],"To":[39],"detect":[40,111],"and":[41,89,112,133,139,154,159],"eventually":[42],"repair":[43,132],"such":[44],"misuses":[45],"automatically,":[46],"inferring":[47],"API":[48],"patterns":[50,88],"from":[51,93],"real-world":[52],"code":[53,92,102],"is":[54],"state-of-the-art.":[56],"A":[57],"contradiction":[58],"an":[60],"identified":[61],"pattern":[63,70],"denotes":[64],"misuse,":[66],"while":[67],"applying":[68],"fixes":[71],"respective":[73],"misuse.":[74,115],"The":[75],"success":[76],"this":[78,117],"process":[79],"heavily":[80],"depends":[81],"quality":[84],"which":[94],"these":[95],"inferred.":[97],"Thus,":[98],"lack":[100],"demonstrating":[103],"makes":[107],"it":[108,136],"impossible":[109],"fix":[113],"In":[116],"paper,":[118],"we":[119],"discuss":[120],"potential":[122],"using":[124,146],"machine-learning":[125],"vector":[126],"embeddings":[127],"improve":[129],"automatic":[130],"program":[131],"extend":[135],"towards":[137],"cross-API":[138],"cross-language":[140],"repair.":[141],"We":[142],"illustrate":[143],"our":[144],"ideas":[145],"technique":[149],"for":[150],"API-embedding":[151],"(i.e.,":[152],"API2Vec)":[153],"describe":[155],"arising":[157],"possibilities":[158],"challenges.":[160]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
