{"id":"https://openalex.org/W4386365925","doi":"https://doi.org/10.18293/seke2023-230","title":"Token-level Input Grammar Synthesis (P)","display_name":"Token-level Input Grammar Synthesis (P)","publication_year":2023,"publication_date":"2023-07-01","ids":{"openalex":"https://openalex.org/W4386365925","doi":"https://doi.org/10.18293/seke2023-230"},"language":"en","primary_location":{"id":"doi:10.18293/seke2023-230","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2023-230","pdf_url":"http://dx.doi.org/10.18293/seke2023-230","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"http://dx.doi.org/10.18293/seke2023-230","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066762060","display_name":"Yunlai Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunlai Luo","raw_affiliation_strings":["College of Computer , National University Of Defense Technology , Changsha , China","College of Computer, National University Of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer , National University Of Defense Technology , Changsha , China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University Of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5066762060"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11855104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2023","issue":null,"first_page":"672","last_page":"673"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10181","display_name":"Natural Language Processing Techniques","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.8955862522125244},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8251065015792847},{"id":"https://openalex.org/keywords/grammar","display_name":"Grammar","score":0.6764084696769714},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.6303578615188599},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5350440740585327},{"id":"https://openalex.org/keywords/rule-based-machine-translation","display_name":"Rule-based machine translation","score":0.5297518968582153},{"id":"https://openalex.org/keywords/attribute-grammar","display_name":"Attribute grammar","score":0.5270191431045532},{"id":"https://openalex.org/keywords/regular-grammar","display_name":"Regular grammar","score":0.526134729385376},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.4986081123352051},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4843381643295288},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4642534852027893},{"id":"https://openalex.org/keywords/character","display_name":"Character (mathematics)","score":0.4370344877243042},{"id":"https://openalex.org/keywords/adaptive-grammar","display_name":"Adaptive grammar","score":0.43491125106811523},{"id":"https://openalex.org/keywords/regular-tree-grammar","display_name":"Regular tree grammar","score":0.42441946268081665},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3928203284740448},{"id":"https://openalex.org/keywords/operator-precedence-grammar","display_name":"Operator-precedence grammar","score":0.3666209578514099},{"id":"https://openalex.org/keywords/affix-grammar","display_name":"Affix grammar","score":0.3092045783996582},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.28252530097961426},{"id":"https://openalex.org/keywords/emergent-grammar","display_name":"Emergent grammar","score":0.13300380110740662},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09984093904495239},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.07160168886184692}],"concepts":[{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.8955862522125244},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8251065015792847},{"id":"https://openalex.org/C26022165","wikidata":"https://www.wikidata.org/wiki/Q8091","display_name":"Grammar","level":2,"score":0.6764084696769714},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.6303578615188599},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5350440740585327},{"id":"https://openalex.org/C53893814","wikidata":"https://www.wikidata.org/wiki/Q7378909","display_name":"Rule-based machine translation","level":2,"score":0.5297518968582153},{"id":"https://openalex.org/C164041254","wikidata":"https://www.wikidata.org/wiki/Q597455","display_name":"Attribute grammar","level":3,"score":0.5270191431045532},{"id":"https://openalex.org/C80191660","wikidata":"https://www.wikidata.org/wiki/Q645527","display_name":"Regular grammar","level":4,"score":0.526134729385376},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.4986081123352051},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4843381643295288},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4642534852027893},{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.4370344877243042},{"id":"https://openalex.org/C121017423","wikidata":"https://www.wikidata.org/wiki/Q4680743","display_name":"Adaptive grammar","level":5,"score":0.43491125106811523},{"id":"https://openalex.org/C57097763","wikidata":"https://www.wikidata.org/wiki/Q7309622","display_name":"Regular tree grammar","level":5,"score":0.42441946268081665},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3928203284740448},{"id":"https://openalex.org/C131232501","wikidata":"https://www.wikidata.org/wiki/Q3113343","display_name":"Operator-precedence grammar","level":4,"score":0.3666209578514099},{"id":"https://openalex.org/C80364944","wikidata":"https://www.wikidata.org/wiki/Q4689005","display_name":"Affix grammar","level":3,"score":0.3092045783996582},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.28252530097961426},{"id":"https://openalex.org/C69298649","wikidata":"https://www.wikidata.org/wiki/Q6045214","display_name":"Emergent grammar","level":3,"score":0.13300380110740662},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09984093904495239},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.07160168886184692},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2023-230","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2023-230","pdf_url":"http://dx.doi.org/10.18293/seke2023-230","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2023-230","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2023-230","pdf_url":"http://dx.doi.org/10.18293/seke2023-230","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386365925.pdf","grobid_xml":"https://content.openalex.org/works/W4386365925.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2499791918","https://openalex.org/W2968973984","https://openalex.org/W3101498506","https://openalex.org/W3179098620","https://openalex.org/W4206113027","https://openalex.org/W4232884709","https://openalex.org/W6666912896","https://openalex.org/W6724273151","https://openalex.org/W6785498396","https://openalex.org/W6800820810"],"related_works":["https://openalex.org/W2940776972","https://openalex.org/W2913286805","https://openalex.org/W4293228709","https://openalex.org/W1973854449","https://openalex.org/W2134685785","https://openalex.org/W2058685095","https://openalex.org/W2289116970","https://openalex.org/W1998200283","https://openalex.org/W2126134344","https://openalex.org/W2170694481"],"abstract_inverted_index":{"It":[0],"is":[1,29,106],"challenging":[2],"to":[3,30,60,79,90,98],"synthesize":[4,31],"the":[5,32,36,41,47,51,81,84,92,100],"input":[6,25,33],"grammars":[7],"for":[8,23],"complex":[9],"parsing":[10],"programs.To":[11],"address":[12],"this":[13,15],"issue,":[14],"paper":[16],"proposes":[17],"a":[18,68,75],"novel":[19,76],"token-based":[20,57],"synthesis":[21,48,71],"method":[22,72],"learning":[24],"grammars.The":[26],"key":[27],"idea":[28],"grammar":[34,70],"at":[35],"token":[37,64,97],"level,":[38,43],"rather":[39],"than":[40],"character":[42,93],"which":[44],"improves":[45],"both":[46],"efficiency":[49],"and":[50],"grammar's":[52,101],"completeness.Specifically,":[53],"we":[54,66,86],"propose":[55,67],"using":[56],"symbolic":[58],"execution":[59],"automatically":[61],"generate":[62],"valid":[63],"sequences.Then,":[65],"token-level":[69],"that":[73],"incorporates":[74],"generalization":[77,82],"operation":[78],"improve":[80],"of":[83,95],"grammar.Additionally,":[85],"utilize":[87],"SMT":[88],"optimization":[89],"generalize":[91],"representation":[94],"each":[96],"enhance":[99],"precision.The":[102],"preliminary":[103],"experimental":[104],"results":[105],"promising.":[107]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-10-10T00:00:00"}
