<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">How Data Scientists Improve Generated Code Documentation in Jupyter Notebooks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Michael</forename><surname>Muller</surname></persName>
							<email>michael1_muller@us.ibm.com</email>
							<affiliation key="aff0">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Cambridge</settlement>
									<region>MA</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">April</forename><forename type="middle">Yi</forename><surname>Wang</surname></persName>
							<email>aprilww@umich.edu</email>
							<affiliation key="aff1">
								<orgName type="institution">University of Michigan</orgName>
								<address>
									<settlement>Ann Arbor</settlement>
									<region>MI</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Steven</forename><forename type="middle">I</forename><surname>Ross</surname></persName>
							<email>slross@us.ibm.com</email>
							<affiliation key="aff2">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<postCode>02142</postCode>
									<settlement>Cambridge</settlement>
									<region>MA</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Justin</forename><forename type="middle">D</forename><surname>Weisz</surname></persName>
							<email>jweisz@us.ibm.com</email>
							<affiliation key="aff3">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Yorktown Heights</settlement>
									<region>NY</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mayank</forename><surname>Agarwal</surname></persName>
							<email>mayank.agarwal@ibm.com</email>
							<affiliation key="aff4">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Yorktown Heights</settlement>
									<region>NY</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kartik</forename><surname>Talamadupula</surname></persName>
							<affiliation key="aff5">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Yorktown Heights</settlement>
									<region>NY</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stephanie</forename><surname>Houde</surname></persName>
							<email>stephanie.houde@ibm.com</email>
							<affiliation key="aff6">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Cambridge</settlement>
									<region>MA</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fernando</forename><surname>Martinez</surname></persName>
							<affiliation key="aff7">
								<orgName type="institution">IBM Argentina</orgName>
								<address>
									<settlement>La Plata</settlement>
									<country key="AR">Argentina</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">John</forename><surname>Richards</surname></persName>
							<affiliation key="aff8">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Yorktown Heights</settlement>
									<region>NY</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jaimie</forename><surname>Drozdal</surname></persName>
							<email>drozdj3@rpi.edu</email>
							<affiliation key="aff9">
								<orgName type="institution">Rensselaer Polytechnic Institute</orgName>
								<address>
									<settlement>Troy</settlement>
									<region>NY</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Xuye</forename><surname>Liu</surname></persName>
							<affiliation key="aff10">
								<orgName type="institution">Rensselaer Polytechnic Institute</orgName>
								<address>
									<settlement>Troy</settlement>
									<region>NY</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">David</forename><surname>Piorkowski</surname></persName>
							<email>david.piorkowski@ibm.com</email>
							<affiliation key="aff11">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Yorktown Heights</settlement>
									<region>NY</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dakuo</forename><surname>Wang</surname></persName>
							<email>dakuo.wang@ibm.com</email>
							<affiliation key="aff12">
								<orgName type="institution">IBM Research AI</orgName>
								<address>
									<settlement>Cambridge</settlement>
									<region>MA</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">How Data Scientists Improve Generated Code Documentation in Jupyter Notebooks</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">8913279EA15C4DB3E69209869B0FB67F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T08:15+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Code-documentation</term>
					<term>Generative AI</term>
					<term>Human-AI collaboration</term>
					<term>Jupyter notebooks</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Generative AI models are capable of creating high-fidelity outputs, sometimes indistinguishable from what could be produced by human effort. However, some domains possess an objective bar of quality, and the probabilistic nature of generative models suggests that there may be imperfections or flaws in their output. In software engineering, for example, code produced by a generative model may not compile, or it may contain bugs or logical errors. Various models of human-AI interaction, such as mixed-initiative user interfaces, suggest that human effort ought to be applied to a generative model's outputs in order to improve its quality. We report results from a controlled experiment in which data scientists used multiple modelsincluding a GNN-based generative model -to generate and subsequently edit documentation for data science code within Jupyter notebooks. In analyzing their edit-patterns, we discovered various ways that humans made improvements to the generated documentation, and speculate that such edit data could be used to train generative models to not only identify which parts of their output might require human attention, but also how those parts could be improved.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>For several decades, scholars have explored how humans and computers might collaborate <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>. Early work largely focused on a zero-sum "trade-off" model in which a finite conceptual pool of "initiative" was to be split between human and computer. Typical approaches asked, in effect, "who goes first?" and many models went no further than a single cycle of human-initiates-and-AI-responds or AI-initiates-and-human-responds (e.g., <ref type="bibr" target="#b5">[6]</ref>).</p><p>More recent work has deconstructed the older concept of unitary "initiative" into a flexible and collaborative framework in which increased initiative by one party (e.g. human) does not imply a decrease of initiative by the other (e.g. AI) <ref type="bibr" target="#b6">[7]</ref>. In addition, the "mixed initiative creative interface" (MICI) framework analyzed by Deterding et al. <ref type="bibr" target="#b0">[1]</ref> and Spoto and Oyelnik <ref type="bibr" target="#b4">[5]</ref>, further developed by Muller et at. <ref type="bibr" target="#b2">[3]</ref>, specifically details how human and AI partners interact in creative tasks as a series of back-and-forth exchanges.</p><p>In this paper, we examine how humans interact with a generative AI model in the context of writing data science documentation. We specifically aim to extend the human-initiates-and-AI-responds interaction pattern to include a step in which a human may make subsequent edits to the outputs of the model. Prior work by our team has explored how data scientists use various kinds of models -including a GNN-based generative model -to aid the task of adding documentation to data science code in Jupyter notebooks <ref type="bibr" target="#b7">[8]</ref>. In this paper, we conduct a deeper analysis on the edits made by participants in that study, to understand the nature of their edit-patterns and how they "compensate" or "augment" the output of the generative models. Through a thematic analysis, we developed a classification of participants' edit-patterns.</p><p>We found that 85% of participants' edit-patterns fully accepted the algorithmically-generated text, or built upon the generated text; and only 15% of the instances involved a complete rewrite. At first glance, these results suggest that the generated text was well-accepted. However, participants modified the generated text in 41% of the cases. Thus, (1) a human requests the generation of text; <ref type="bibr" target="#b1">(2)</ref> the AI provides that text; and then (3) the human makes a decision to use -or not to use -that text, and (4) may go on to edit the generated text. In the future, these threeto-four dialogic "moves" could become the basis for an extended conversation between human AI.</p><p>In this paper, we develop a taxonomy of edit-patterns, discovering that some edits added missing details while other edits explained the function of the code. A third category of edits was primarly concerned with modifying the formatting or style of the documentation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head><p>We discuss recent work in the area of AI and machine learning applied to data science and software engineering, as well as the application of generative models to this domain. We also discuss recent studies on human interactions with generative models in software engineering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">AI and Machine Learning in Software Engineering</head><p>In recent years, techniques from AI and machine learning have been applied to various tasks in software engineering, including code completion <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>, code translation <ref type="bibr" target="#b12">[13]</ref>, code classification <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>, API recommendation <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>, variable and method naming <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref>, type inference <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>, bug detection and repair <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23,</ref><ref type="bibr" target="#b23">24,</ref><ref type="bibr" target="#b24">25,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b26">27]</ref>, comment description and generation <ref type="bibr" target="#b27">[28,</ref><ref type="bibr" target="#b28">29,</ref><ref type="bibr" target="#b29">30,</ref><ref type="bibr" target="#b30">31,</ref><ref type="bibr" target="#b31">32,</ref><ref type="bibr" target="#b32">33]</ref>, code change summarization <ref type="bibr" target="#b33">[34]</ref>, and code clone detection <ref type="bibr" target="#b34">[35]</ref>. Allamanis et al. <ref type="bibr" target="#b35">[36]</ref> provides a comprehensive review of the use of AI and machine learning within data science and software engineering. The emergence of generative AI techniques for natural language, such as GPT-2 <ref type="bibr" target="#b36">[37]</ref> and GPT-3 <ref type="bibr" target="#b37">[38]</ref>, have also been reflected in code-centric use cases: Brockschmidt et al. <ref type="bibr" target="#b38">[39]</ref> proposed the use of generative models for source code, and Tufano et al. <ref type="bibr" target="#b39">[40]</ref> used generative models to fix bugs. In this paper, we conduct a deeper analysis of participant interactions with Wang et al. <ref type="bibr" target="#b7">[8]</ref>'s Themisto documentation-generation system, which incorporates a GNN-based generative model for generating comments from code.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Human-AI Collaboration with Generative Models in Data Science and Software Engineering</head><p>In a recent study, Weisz et al. <ref type="bibr" target="#b40">[41]</ref> examined the use of an unsupervised neural machine translation (NMT) model in addressing a task in application modernization, specifically regarding translating code from a legacy language to a modern one. They found that software engineers would be tolerant of errors or mistakes in the output of an NMT model, as the code produced by that model would be subject to the same review and testing procedures as code produced by everyone else on their team. In addition, a code highlighting feature that indicated where in the code human attention might be needed, based on an aggregation of the model's token-level confidences, was very desirable. Although a subsequent analysis by Agarwal et al. <ref type="bibr" target="#b41">[42]</ref> demonstrated how current metrics of model confidence may not necessarily correlate with external truth of code quality (approximated by lint errors), the ability for a generative model to be able to "ask for help" via code highlights was nonetheless highly valued by software engineers. In this work, we push even further by seeking to understand whether a generative model can also specify what kind of it help it needs from its human user.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method</head><p>In order to understand the co-creation process of data science documentation, we examined Themisto <ref type="bibr" target="#b7">[8]</ref> a prototype code documentation generation system that supports data scientists in writing documentation for computational notebooks. <ref type="foot" target="#foot_0">1</ref> Wang et al. <ref type="bibr" target="#b7">[8]</ref> conducted an evaluation of Themisto with 24 data science professionals. In this section, we briefly discuss how Themisto generates documentation from code, as well as the user study setup and data collection methodology. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Themisto: A System for Automatic Documentation Generation</head><p>We implemented the automatic documentation generation system as an extension to JupyterLab (Figure <ref type="figure" target="#fig_0">1</ref>). The extension generates three types of documentation for a given code snippet. The first type of documentation is generated using a Graph Neural Network based approach <ref type="bibr" target="#b44">[45]</ref> which is commonly used in code summarization tasks. The second type of documentation is generated by retrieving relevant external API documentation for a code function (e.g., functions defined in Pandas<ref type="foot" target="#foot_1">2</ref> , Numpy<ref type="foot" target="#foot_2">3</ref> , and Scikit-learn <ref type="foot" target="#foot_3">4</ref> ). Lastly, the extension also provides a prompt-based approach where users are given a short prompt to manually create the documentation. For example, if a code cell contains a graphic output, the extension would generate the prompt to ask users to interpret the output.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">User Study Setup</head><p>We are interested in how users make revisions on the suggested explanations. Thus, we recruited 26 data scientists to add documentation to a given draft notebook using the prototype. We prepared two draft notebooks with the same length (9 code cells) and similar levels of difficulty, but for two different problems. Each partici-pant was randomly given one of the two notebooks and asked to document the notebook within 12 minutes; two participants failed to complete the task within that timeperiod, and were excluded from further analysis. Before the study, we provided a quick demo on the functionality of the extension.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Data Collection</head><p>We collected the completed final notebooks (N=24) after participants finished the task. All study sessions were conducted remotely using a teleconferencing tool and we recorded participants' screens with their permissions.</p><p>After the session, we conducted a retrospective interview to ask about their experience and feedback. We wanted to understand how participants used the algorithmically-generated documentation. For orientation, we review that 13 participants made documentation choices and optional modifications in each of nine markdown cells in each of two notebooks ("Covid" and "house") -i.e., 13 participants for each notebook. In the data from each notebook, we discovered two participants (per notebook) who did not complete the task, or who created extra cells. We could not be certain how to "map" these extra cells to the structure that was common across the other 11 participants. Because we wanted to compare participants' responses in a disciplined way, we treated each of these people (who created extra cells) as outliers, and excluded them from analysis. This exclusion left us with 11 participants per notebook who had worked with P07-house+6 using the specified method the algorithmically-generated documentation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.1.">Preparatory Analysis</head><p>To prepare the documentation for analysis, we grouped all of the texts for each cell together (separately for each notebook). We then used a bag-of-words method to identify words (tokens) that were not included in the algorithmically-generated documentation. In the quotations in this paper, the participant-introduced words appear in bracketed [blue-ink]. 5 Table <ref type="table" target="#tab_0">1</ref> provides an illustrative example. This was a slightly conservative method for identifying new text, because we might fail to detect that a participant had typed "data" (for example) in their own usage, rather than including the word "data" from the algorithmically-generated text. However, we used this method only to orient ourselves to the texts.</p><p>We next read each text by each participant. After readings all of the texts, two researchers agreed upon a codebook of edit-patterns. One researcher than applied that codebook rigorously to all of the texts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.2.">Reference Notation</head><p>We identify each text in terms of the participant number (1-26, with two non-completers and two outliers excluded), the notebook ("covid" or "house"), and the cell in the notebook (1-9). For example, "p21-house+4" refers to participant 21, in the "house" notebook, in the 4th markdown cell.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results: High-Level Quantitative Comparisons</head><p>this workshop paper, we present new analyses to examine the edit-patterns in the 41% of the cells with participantedited documentation. There were few statistically significant differences between participant data from the two notebooks. We briefly report those analyses here, before the qualitative analyses that are the core of this paper. Because we did not find differences between the two notebooks, we will then perform content analyses of participants' text on the combined data from the two notebooks in Sections 5 and 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Starting Points for Documentation</head><p>We provided three different Sources of documentation: AI, Query, and Prompt. A chi-square analysis found no significant differences in the proportions of Sources chosen by participants in each notebook. We also looked at combinations of Sources -i.e., no discernable source vs. a single source vs. multiple sources. Again, a chi-square analysis showed no significant differences between the notebooks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Edit-Patterns</head><p>We describe distinct Edit-Patterns below in Sections 5 and 6. Here, we briefly state that we used chi-square tests to examine whether participants used different editpatterns between the two notebooks. Only one of editpatterns showed a significant difference, and that pattern was concerned with the format (not the content) of the documentation (i.e., levels of headers in the markdown cell).</p><p>Similarly to the "combinations" analysis of Section 4.1, we found no significant differences across notebooks for cells with zero edit-patterns, a single edit-pattern, or multiple edit-patterns.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results: Content-Related Edit-Patterns</head><p>The preceding quantitative analyses showed only a single, stylistic difference in participants' work with the two notebooks. We therefore combine our qualitative analyses of edit-patterns across the two notebooks.</p><p>We manually coded the edit-patterns in each participant's text in each markdown cell, according to our codebook (Section 3.3.1). For the 22 participants in nine markdown cells, we thus coded 99 texts in each notebook, for a total of 198 coded markdown cells. We applied an informal version of thematic analysis <ref type="bibr" target="#b45">[46]</ref>, noting Braun's and Clarke's advice that there are multiple ways of conducting a thematic analysis <ref type="bibr" target="#b46">[47]</ref>. Previous grounded theory and thematic analysis studies have involved from 6 to 74 participants <ref type="bibr" target="#b47">[48,</ref><ref type="bibr" target="#b48">49]</ref>, and so our sample of 22 participants is within that conventional range. Within this sample, we used the saturation practices of Guest et al. <ref type="bibr" target="#b49">[50]</ref> (recommended by Ando et al. <ref type="bibr" target="#b45">[46]</ref>) and Majid et al. <ref type="bibr" target="#b50">[51]</ref>, defining saturation by a code that appeared from at least two participants. We made no restrictions on the number of codes that we identified in a single text. Thus a text might have zero codes if the participant simply accepted the algorithmically-generated documentation, or it might have as many as three or four different codes in complex cases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Details Edit-Patterns (three subcategories)</head><p>Participants expanded on the generated documentation by adding details. There were three subcategories of details: Contextual information, information about Thisstep (the current step), and information about Subsequent steps.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.1.">Contextual Details</head><p>Contextual details could take several forms. P03-house clarified how the prior steps had produced materials that were used in the current step: In some cases, participants added specific algorithmic details that none of the generated texts had included. A repeated example was to mention (and sometimes discuss) root mean square error and its importance:</p><p>• ### evaluate a score by cross-validation [uses rmse as an evaluation metric] with [5-fold] cross-validation (p03-house+9)</p><p>• ### evaluate a score by <ref type="bibr">[5-fold]</ref> cross-validation [using rmse] (p15-house+9)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.3.">Next-Step</head><p>We found a third edit-pattern that anticipated the next step (i.e., a subsequent cell) in the notebook. P08-covid briefly stated the use that the inputted data would be put to:</p><p>• ### read [and sanity check] the data (p04-covid+2)</p><p>However, in other cases, the participant provided a much richer description of the next steps, as in this recitation by P05-covid:</p><p>• ### Model A random forest is a meta estimator that fits a number of decision tree classifiers on various subsamples of the dataset and uses averaging to improve the predictive accuracy and control over-fitting the [first line below initiates] a model [instance] and the [second line] fits the model on the [training data] (p05-covid+8)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.4.">Details Patterns Summary</head><p>We have shown three edit-patterns in which participants have provided more detail than was available in the generated texts. These patterns might be considered as spanning an imagined audience's reading experience. In some cases, participants wrote Contextual information into the generated texts. This contextual information was generally retrospective -i.e., what should the reader have known in order to understand the code? In contrasting cases, participants focused less on context, and more on content within the current cell (This-step). Finally, in a few cases, participants wrote to anticipate the next cell or cells. In the Discussion, we will think further about this kind of participants' mental model of their audience's experiences.</p><p>We also wish to acknowledge that some of our category boundaries are fuzzy. The next category of edit-patterns poses the question -what is the difference between a Details edit-pattern and an Explanation edit-pattern? With further research, we may need to redraw this boundary.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Explanation Edit-Patterns</head><p>Sometimes participants went beyond simple details, writing a more extended Explanation. P02-house and P15house provided brief examples, in which they added operational explanations of how to perform the activity in the cell:</p><p>• ### return the first 5 rows [(defvalue=5)] (p02-house+3) The Explanation edit-pattern brings in different types of information, including operational aspects and extended explanatory material about data files and programmatic resources. As we noted above, with more data, we may discover that Explanations may need to be combined with Details. Another possibility is that Explanations may turn out to be a subset of Tutorial edit-patterns, which we describe in the next subsection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">Tutorial Edit-Patterns</head><p>In a more complex pattern, participants appeared to be teaching the reader how to do the analysis. For example, P05-covid provide detailed explanations about how to carry-out a series of operations in python: Finally, we note that P24-covid took a somewhat different tutorial strategy. They left the original generated text intact as provided by the algorithm, and then added a link to more information about the python code-structures that were used in the cell that the algorithm had described:</p><formula xml:id="formula_0">• ### convert [</formula><p>• p24-covid/expt ### replace a specified phrase with another specified phrase [[for more information about lambda](https://realpythoncom/python-lambda/)] (p24-covid+4)</p><p>Tutorial edit-patterns went much further than Explanation edit-patterns (which themselves had gone further than Details edit-patterns). Tutorial edit-patterns provide not only how-to information, but also interpretations of the meaning or purpose of actions, and in one case a link to further information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4.">Rewriting Edit-Patterns</head><p>In the preceding subsection, we began to describe a dimension of increasing complexity in the information that participants provided, and also (we infer) increasing effort on the part of the informants to think "beyond" what was given in the generated text. The last edit-pattern in this series involves even more "beyond" work: beyond previous transformations of the generated text, and probably beyond previous levels of effort. We call this editpattern "Rewriting, " because it involves nearly complete replacement of the generated text.</p><p>It may be that the generated text in certain cells led to more instances of Rewriting. For example, three different participants rewrote the generated text of cell 4 of the House notebook:</p><p>• ### [join features from train and test into one df] (p15-house+4)</p><p>• ### [transform and clean] the [data] (p22-house+4)</p><p>• ### [concat train and test col salecondition] (p02-house+4)</p><p>Similarly, two people rewrote the contents of cell 9 of the Covid notebook:</p><p>• ### [make predictions] (p17-covid+9)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• ### [test] to [see how] the [model performs] (p20-covid+9)</head><p>While it initially appears that Rewritten cells were relatively brief, we found that two other participants Rewrote the same cell (cell 9 of the Covid notebook) at much greater length: In some cases, partipants Rewrote the generated text at a higher level of sophsitication:</p><formula xml:id="formula_1">• ### [</formula><formula xml:id="formula_2">• ### [one hot encode] the [features] (p15-house+5)</formula><p>And in one case, the participant Rewrote in a very summary fashion, only listing a series of steps:</p><p>• [modeling process -subsetting data -cleaning datagetting rid of nulls -model training] (p14-house+4)</p><p>In the Rewriting edit-pattern, we see diverse strategies, ranging from brief summaries to extensive new text, as well as high-level abstractions. Significantly, in multiple cases, participants made distinctly different Rewritings of the same generated text (i.e., in the same cell of the notebook). Thus, while the category of the edit-pattern is the same, the individual strategies can be quite different. We recall that we saw analogous patterns in the This-step Details edit-patterns of subsesction 5.1.2. While there may be agreement among participants that the generated text in certain cells requires a certain type of change, participants clearly adopt different strategies about how to make those changes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.5.">Content Edit-Patterns Summary</head><p>In this part of Results, we have examined how participants changed the contents of the generated texts. Figure <ref type="figure" target="#fig_1">2</ref> summarizes a dimension that runs from simple Details, to more complex Explanations, to instructive Tutorials, and finally to complete Rewritings of the generated text. Collectively, participants have an extensive repertoire of edit-patterns that they apply to particular problems in particular documentation cells. We next examine more stylistic changes that participants applied to generated text.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Results: Stylistic Edit-Patterns</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1.">Modifying document hierarchies</head><p>Sometimes in combination with other edit-patterns, participants modified the markdown formatting from the generated texts. Initially, all markdown texts were provided at the same hierarchical level (###). In multiple cases, participants modified those levels, placing texts in super-order / sub-order relation to one another:</p><formula xml:id="formula_3">• [#####] this code cell is for [handling] missing val-</formula><p>ues [which are replaced with] the [mean value] for [that feature] this is [also known as column-wise meanimputation] (p11-house+6) P17-covid modified the header markdown specification when combining the contents of two different forms of generated text:</p><formula xml:id="formula_4">• ### [create] a [classifier ####] random forest [classifier] (p17-covid+8)</formula><p>Further research will be needed to understand if these stylistic/formatting edits are related to changes to the words in the documentation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2.">Completing a Sentence</head><p>Some of the changes to content appeared to clarify what was being done in the code. The primary subcategory of these changes was to add a verb to a noun-phrase:</p><formula xml:id="formula_5">• ### [fit] the model (p01-covid+8) • ### [train the] model (p10-house+8)</formula><p>Some participants added the verb in a different position in the sentence. In these two examples, we see P21-covid and P24-covid modifying the same generated text, but with different versbs:</p><formula xml:id="formula_6">• ### model [creating] (p21-covid+8) • ### model [training] (p24-covid+8)</formula><p>However, participants also engaged in more complex ways of completing a sentence. For example, P01-covid both added a verb and changed the object of that verb:<ref type="foot" target="#foot_6">7</ref> </p><p>• [generate] the [predictions] (p01-covid+9)</p><p>While editing the same cell, P02-house, P07-house, and P15-house added the same verb, but then made different modifications to the object of that verb:</p><formula xml:id="formula_7">• ### [fit regression] model (p02-house+8)</formula><p>• ### [fit] a lasso linear model [to the training data] (p07-house+8)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• ### [train] lasso [cv] linear model (p15-house+8)</head><p>There were also even more complex cases, in which it is not clear if the participant's purpose was to complete a sentence Here, we repeat one example of P17-covid from the previous subsection, which illustrates our point about the ambiguity of complex cases:</p><formula xml:id="formula_8">• ### [create] a [classifier ####] random forest [classifier] (p17-covid+8) • ### [leverage] the random forest model and [fit] the model [with training] dataset [(a]</formula><p>random forest is a meta estimator that fits a number of decision tree classifiers on various sub-samples of the dataset and uses averaging to improve the predictive accuracy and control [over-fitting)] (p13-covid+8)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3.">Conversational Tone</head><p>We observed a further stylistic modification which appeared to make the generated text more conversational.</p><p>To avoid asserting our own judgments of what "conversational" might mean, we show only examples in which the participant added a personal pronoun -typically "we" or "you". For ease in reading, we have bolded those pronouns in the following examples:</p><p>• importing libraries: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.4.">Stylistic Edit-Patterns Summary</head><p>We acknowledge that the distinction between content and style is far from clear (e.g., <ref type="bibr" target="#b52">[53]</ref>). Therefore, we consider that our current categorization of Content-Related edit-patterns and Stylistic edit-patterns may require revision. With larger datasets, we may for example conclude that Conversational Tone is more related to Tutorial changes, and less related to "style. " The same may occur with Completing a Sentence. We will also need to understand better the relationship of header-styles to content in brief documentation text snippets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Results: Summary Statistics of Edit-Patterns</head><p>We computed the percentage of the Content-edited cells in which each of the above Content edit-pattern appeared. Details edit-patterns were the most frequent. This may be unsurprising, because these kinds of edit-patterns took relatively little effort (Figure <ref type="figure" target="#fig_1">2</ref>). In general, edit-patterns that were most costly of effort (Tutorial, Rewritten) had lower frequencies of occurrence, with Rewritten editpatterns occurring in fewer than 15% of the edited cells. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Discussion</head><p>These results have implications for the design of algorithmic documentation systems. Taken together with our prior work on TransCoder, we can also see emergent ideas about how people can understand and make use of AI outcomes, even in the absence of formal explanatory systems (e.g., Explainable AI, or XAI). Finally, these two projects point us toward important questions in the design of future human-AI collaborative systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.1.">Learning from Participants' Improvements</head><p>The results we reported on participants' editing patterns lead us to think about a few implications to further improve the automatic documentation approach. First, the Details edit-patterns, Explanation edit-patterns, and Tutorial edit-patterns are relevant to the purpose of the notebook and the target audience. We believe that a future version of the generative approach should tailor the automatic documentation based on the usage scenario. Data scientists can benefit from more candidate documentation where the level of details varied. With a larger dataset, we could associate these editpatterns to particular patterns in the algorithmicallygenerated texts. Based on those associations, we could modify the algorithms to anticipate the kinds of edits that humans have previously made (e.g., <ref type="bibr" target="#b53">[54]</ref>). For example, if we can remove the need for Details-related and Conversational-Tone edits, then humans can focus on higher-value editing, such as Tutorials. We may then see emergent categories of even more task-specific and/or domain-oriented edit-patterns, when humans no longer need to put work into less significant edits.</p><p>One way to do this, is to include a reinforcement learning component into the algorithm that could learn from users' modifications to the proposed texts. Our current GNN model relies on the size of the training dataset to ensure the quality of the results. However, data science code snippets are patternless and are of limited use for generating explanations. In the future, we can combine deep reinforcement learning with our current GNN model <ref type="bibr" target="#b54">[55]</ref> to improve the performance and generalizability of the results. This can help provide consistent stylistic documentation in terms of the writing style, sentence structure, and level of details.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.2.">Flawed Generative Outcomes can be Useful Outcomes</head><p>In our earlier generative documentation paper <ref type="bibr" target="#b7">[8]</ref>, we learned that people accepted algorithmically-produced documentation in 45% of the cells. In this workshop paper's analysis of the 41% of edited cells, participants retained at least part of the generated text in over 85% of the cells (Details, Explanations, Tutorials). The fact that they chose to do the extra work to Rewrite in only 15% of the cells, is evidence that they mostly chose to work with imperfect text rather than to replace it. This outcome is consistent with our previous study of code translation, in which engineers reported that they preferred an imperfect translation to no translation at all. While we hope to improve our generative algorithms in both research programs, we also envision future studies in which we will calibrate the quality of the outcomes, to determine the threshold of "poor quality" below which an algorithm should not be deployed. We could then perhaps provide a more "skeletal" outcome, such as an outline of documentation rather than full-text. We could also treat "poor-quality" instances as higher-priority opportunities for algorithmic improvement.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.3.">Deepening Human-AI Collaborations</head><p>We now consider each of our research programs (translation and documentation) in terms of published patterns of human-AI collaboration <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b0">1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b4">5]</ref>. In both of our studies, the human provides some initial information (source code in both cases), and the generative algorithm responds with a proposed outcome text (target code or documentation, respectively). After that, with minimalist support, the human has to make their own way -e.g., by choosing among alternative translations for sections of the target code, or by manually editing the documentation.</p><p>These patterns remain consistent with simple initiative models (e.g., <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4]</ref>), and fall short of the richer on-going interactions of some of the experimental MICI applications <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5]</ref>, with their potential of AI-augmentation in support of skilled human work. We anticipate that future versions of both projects could move toward longer and richer exchanges between human and AI (e.g., <ref type="bibr" target="#b5">[6]</ref>).</p><p>If the human edits the target code in the TransCoder project, then a secondary AI (e.g., <ref type="bibr" target="#b11">[12]</ref>) might assist by generating completion of the human's new code or suggesting additional modifications to the target to remain consistent with the changes. This secondary AI would be "aware" of the original code, and could provide additional type-ahead support, advice, or consultation as needed. Similarly, if the human edits the generated text in the Documentation project, then a secondary AI (e.g., <ref type="bibr" target="#b55">[56]</ref>) could provide assistance with Details types of edits, but could also provide language-quality (Stylistic) support for more complex Tutorial accounts, or even narratives (e.g., <ref type="bibr" target="#b56">[57]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.4.">How Does a Generative AI Model</head><p>Ask for Help?</p><p>Our work highlights an opportunity for enriching human interactions with generative models. At a base level, a generative model takes input (e.g. code) and produces output (e.g. documentation for that code). Agarwal et al. <ref type="bibr" target="#b41">[42]</ref> demonstrate how a generative model can produce confidence scores alongside its output, and Weisz et al. <ref type="bibr" target="#b40">[41]</ref> show the utility such scores can have in steering human attention toward reviewing portions of the output in which the model has low confidence. In this work, we demonstrate how having an understanding of the nature of human edit-patterns to a generative model's output can enable a generative model to not only identify where human attention is needed, but also how human effort can be used to improve the quality of its output. One of the interesting questions will be exactly how to choose among those alternatives -i.e., when is typeahead useful, and how should a watchful but respectful AI intervene with advice, and what dialogic or other communication structures should be involved in an on-going AI-human consultation <ref type="bibr" target="#b57">[58,</ref><ref type="bibr" target="#b58">59,</ref><ref type="bibr" target="#b59">60]</ref>)? Our experiences with the NMT algorithm in the TransCoder experiment showed that, with a sufficiently broad beam-search <ref type="bibr" target="#b60">[61]</ref>, we could generate a manageable set of alternative translations, which could be compared using an algorithm like <ref type="bibr" target="#b61">[62]</ref> to determine regions of agreement between the translations as well as regions of uncertainty along with the alternatives considered for the uncertain regions. These alternatives could then serve as informal explanations -e.g., "Q: Why is the output marked as uncertain in this region? A: Because the algorithm considered multiple possible translations at this point, and this is what they were. "</p><p>The GNN in the Documentation project might also be modified to produce multiple possible texts, with similar explanatory power ("Q: Why is this documentation marked as uncertain... ").</p><p>If there are multiple, alternative outcomes with no emergent "most-probable" alternative, then this could become an initiation point at which the algorithm de-tects the need for human assistance. One way to implement this request-for-help is as a "human-in-the-loop" paradigm, in which the human responds to the needs of the algorithm. We also envision situations in which the human may be in the midst of editing code or text, and may ask the algorithm to serve as a text-assistant for the human's on-going editing work. This could become an example of the "AI in the loop" paradigm that we discussed at last year's workshop. In these ways, we could move from the relatively single-process "initiative" models of <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b6">7]</ref>, and toward a more collaborative and on-going series of interactions as in <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.5.">Limitations</head><p>In order to conduct a controlled study, we sacrificed ecological validity. We asked participants to document someone else's notebook. By contrast, the canonical case in Jupyter notebooks is to document one's own code. A future goal should be a more naturalistic practice of documenting my notebook.</p><p>Paradoxically, for precision of evaluation, we may also need to perform an even more controlled study, in which each person receives only one algorithm's text at a time. This approach could help us to assess each algorithmic approach more independently than in the preliminary experiment in this workshop paper.</p><p>We also note that our analytic method could be strengthened in future research. Our bag-of-words approach was insensitive to word-order, and we looked only at patterns of added words. Future work should also examine patterns of deleted words.</p><p>Finally, we note the obvious sampling weaknesses. We conducted a relatively small study in a single institution. We hope to examine similar practices in other settings, and with more participants.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9.">Conclusion</head><p>In this workshop paper, we have addressed topics in human-AI collaboration in data science and software engineering. We reported text analytic results from a study of generative documentation, showing that participants accepted generated text with or without modification in the majority of instances. These results are consistent with our earlier work, in which engineers were enthusiastic about using imperfect NMT-generated translations of software code. Similarly, participants in this study were also quite ready to accept or to work with imperfect GNN-generated texts. We also analyzed the edit-patterns in the generated text, developing categories that suggest future work directions. Finally, going beyond early unidirectional models of "initiative, " we sketched promising directions for longer-term, on-going human-AI collaborations.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1:The Themisto user interface<ref type="bibr" target="#b7">[8]</ref> is implemented as a Jupyter Notebook plugin: (A) When the recommended documentation is ready, a lightbulb icon shows up to the left of the currently-focused code cell. (B -D) shows the three options in the dropdown menu generated by Themisto, (B) A documentation candidate generated for the code with a deep-learning model, (C) A documentation candidate retrieved from the online API documentation for the source code, and (D) A prompt message that nudges users to write documentation on a given topic.</figDesc><graphic coords="3,123.42,84.08,348.00,185.52" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Dimension of Content Edit-Patterns.Figure description: Graphical display of four Content Edit-Patterns, in a two-dimensional abstract sapce. The horizontal axis represents the complexity of the edit-patterns. The vertical axis represents the inferred amount of participant effort to make the changes. The four classes of edit-patterns run from the lower left (low-low) to the upper right (high-high), in the order of Details, Explanations, Tutorials, and Rewritings.</figDesc><graphic coords="8,136.57,84.19,322.14,121.68" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure description :</head><label>description</label><figDesc>Figure 2: Dimension of Content Edit-Patterns.Figure description: Graphical display of four Content Edit-Patterns, in a two-dimensional abstract sapce. The horizontal axis represents the complexity of the edit-patterns. The vertical axis represents the inferred amount of participant effort to make the changes. The four classes of edit-patterns run from the lower left (low-low) to the upper right (high-high), in the order of Details, Explanations, Tutorials, and Rewritings.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>[in] this code [segment you import the python] libraries [first that include 'numpy'] and ['panda' you also import] a [class from sklean if you need to display some warning import the warnings] library [as shown] (p21-covid+1) • ### [define] and [configure] the model a random forest is a meta estimator that fits a number of decision tree classifiers on various sub-samples of the dataset and uses averaging to improve the predictive accuracy and control over-fitting [we also train] the model [with 'fit()'] (p04-covid+8) • [##### here we] evaluate the [square-root of] the [5fold cross-validated mean-squared-error of] the [trained] model with the [training set '(x_train y)' (p11-house+9) • ### [we now show] the [predicted values] (p24-covid+9)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Edit-Patterns -Applicable as Modifications to Algorithmically-Generated Text</figDesc><table><row><cell>Source text</cell><cell>Participant text</cell><cell>Participant+Cell</cell></row><row><cell>Details -Current</cell><cell></cell><cell></cell></row><row><cell>### Evaluate a score</cell><cell cols="2">### evaluate a score by [5-fold] cross-validation [using P15-house+9</cell></row><row><cell>by cross-validation</cell><cell>[rmse]</cell><cell></cell></row><row><cell cols="2">### Fill NA/NaN values ### [replace] na/nan values [with the mean]</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 2</head><label>2</label><figDesc>Percent of All Edit-Patterns in Edited Cells</figDesc><table><row><cell>Edit-Pattern</cell><cell>Percentage of All Edited Cells</cell></row><row><cell>Details-Contextual</cell><cell>5.08%</cell></row><row><cell>Details-This-step</cell><cell>33.90%</cell></row><row><cell>Details-Next-step</cell><cell>5.08</cell></row><row><cell>Explanations</cell><cell>11.02%</cell></row><row><cell>Tutorial</cell><cell>8.47%</cell></row><row><cell>Rewritten</cell><cell>14.41%</cell></row><row><cell>Markdown headers</cell><cell>5.08%</cell></row><row><cell>Complete sentence</cell><cell>12.71%</cell></row><row><cell>Conversational tone</cell><cell>4.24%</cell></row><row><cell cols="2">Note: A single cell could contain multiple edit-patterns.</cell></row><row><cell cols="2">Therefore, sums of percentages may not be meaningful.</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">While Jupyter notebooks have been used in education, we note that these notebooks are increasingly the basis of commercial products<ref type="bibr" target="#b42">[43,</ref><ref type="bibr" target="#b43">44]</ref>, as in offerings by IBM [https://developer.ibm.com/components/jupyter/] and Microsoft [https://notebooks.azure.com/].</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">https://pandas.pydata.org/docs/reference/index.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">https://numpy.org/doc/stable/reference/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">https://scikit-learn.org/stable/modules/classes.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_4">Participants accepted the algorithmically-generated documentation unchanged in 45% of the cells, and they edited the algorithmically-generated documentation in 41% of the cells. The remaining 9% of the cells were left blank. In<ref type="bibr" target="#b4">5</ref> Readers who use a screenreader may want to consult https://doccenter.freedomscientific.com/doccenter/doccenter/ rs25c51746a0cc/2012-06-20_TextFormatting/02_TextFormatting. htm for information on how to access font-attributes through JAWS.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_5">We note that P01-covid edited-out the markdown formatting command, "###". We will have more to say about this kind of stylistic edit-pattern, below.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_6">We use "verb" and "object" in the technical senses of Englishlanguage grammar (e.g.,<ref type="bibr" target="#b51">[52]</ref>). A "verb" performs an action. An "object" receives the effect of that action.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Mixedinitiative creative interfaces</title>
		<author>
			<persName><forename type="first">S</forename><surname>Deterding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hook</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fiebrink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gillies</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Akten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Liapis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Compton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems</title>
				<meeting>the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="628" to="635" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Principles of mixed-initiative user interfaces</title>
		<author>
			<persName><forename type="first">E</forename><surname>Horvitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the SIGCHI conference on Human Factors in Computing Systems</title>
				<meeting>the SIGCHI conference on Human Factors in Computing Systems</meeting>
		<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="159" to="166" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Muller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Weisz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Geyer</surname></persName>
		</author>
		<title level="m">Mixed initiative generative ai interfaces: An analytic framework for generativeai applications</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A model for types and levels of human interaction with automation</title>
		<author>
			<persName><forename type="first">R</forename><surname>Parasuraman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Sheridan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Wickens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on systems, man, and cybernetics-Part A: Systems and Humans</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="286" to="297" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Spoto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Oyelnik</surname></persName>
		</author>
		<ptr target="http://mici.codingconduct.cc" />
		<title level="m">Library of mixed initiative creative interfaces</title>
				<imprint>
			<date type="published" when="2017-12-21">2017. 21-December-2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Genjam: Evolution of a jazz improviser</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Biles</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Creative evolutionary systems</title>
				<imprint>
			<publisher>Elsevier</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="165" to="187" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Human-centered artificial intelligence: Reliable, safe &amp; trustworthy</title>
		<author>
			<persName><forename type="first">B</forename><surname>Shneiderman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Interaction</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="495" to="504" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Drozdal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Muller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Weisz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Dugan</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2102.12592</idno>
		<title level="m">Themisto: Towards automated documentation generation in computational notebooks</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">On the naturalness of software</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hindle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Barr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gabel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Devanbu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2012 34th International Conference on Software Engineering (ICSE), IEEE</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="837" to="847" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Code completion with statistical language models</title>
		<author>
			<persName><forename type="first">V</forename><surname>Raychev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vechev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yahav</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation</title>
				<meeting>the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="419" to="428" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Learning from examples to improve code completion systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bruch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Monperrus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mezini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering</title>
				<meeting>the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="213" to="222" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Svyatkovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Deng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Sundaresan</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2005.08025</idno>
		<title level="m">Intellicode compose: Code generation using transformer</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Unsupervised translation of programming languages</title>
		<author>
			<persName><forename type="first">B</forename><surname>Roziere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M.-A</forename><surname>Lachaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chanussot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advances in Neural Information Processing Systems</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note>ple</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Convolutional neural networks over tree structures for programming language processing</title>
		<author>
			<persName><forename type="first">L</forename><surname>Mou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Jin</surname></persName>
		</author>
		<ptr target="http://www.aaai.org/ocs/index.php/AAAI/AAAI16/paper/view/11775" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Schuurmans</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Wellman</surname></persName>
		</editor>
		<meeting>the Thirtieth AAAI Conference on Artificial Intelligence<address><addrLine>Phoenix, Arizona, USA</addrLine></address></meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2016">February 12-17, 2016. 2016</date>
			<biblScope unit="page" from="1287" to="1293" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Jayasundara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D Q</forename><surname>Bui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lo</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1910.12306</idno>
		<title level="m">Treecaps: Tree-structured capsule networks for program source code processing</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Continuous deep q-learning with model-based acceleration</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Lillicrap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sutskever</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Levine</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Machine Learning</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="2829" to="2838" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">SAR: learning cross-language API mappings with little knowledge</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D Q</forename><surname>Bui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Jiang</surname></persName>
		</author>
		<idno type="DOI">10.1145/3338906.3338924</idno>
		<idno>doi:10.1145/3338906.3338924</idno>
		<ptr target="https://doi.org/10.1145/3338906.3338924" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/SIGSOFT FSE 2019</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Pfahl</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Apel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Russo</surname></persName>
		</editor>
		<meeting>the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/SIGSOFT FSE 2019<address><addrLine>Tallinn, Estonia</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2019">August 26-30, 2019. 2019</date>
			<biblScope unit="page" from="796" to="806" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A convolutional attention network for extreme summarization of source code</title>
		<author>
			<persName><forename type="first">M</forename><surname>Allamanis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sutton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International conference on machine learning</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="2091" to="2100" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">code2vec: Learning distributed representations of code</title>
		<author>
			<persName><forename type="first">U</forename><surname>Alon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zilberstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Levy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yahav</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ACM on Programming Languages</title>
				<meeting>the ACM on Programming Languages</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="1" to="29" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Deep learning type inference</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">J</forename><surname>Hellendoorn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Bird</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Barr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Allamanis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2018 26th acm joint meeting on european software engineering conference and symposium on the foundations of software engineering</title>
				<meeting>the 2018 26th acm joint meeting on european software engineering conference and symposium on the foundations of software engineering</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="152" to="162" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Wei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Goyal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Durrett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dillig</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2005.02161</idno>
		<title level="m">Lambdanet: Probabilistic type inference using graph neural networks</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">On the &quot;naturalness&quot; of buggy code</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Hellendoorn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Godhane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Tu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bacchelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Devanbu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM 38th International Conference on Software Engineering (ICSE), IEEE</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="428" to="439" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Deepbugs: A learning approach to name-based bug detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pradel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ACM on Programming Languages</title>
				<meeting>the ACM on Programming Languages</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1" to="25" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Vasic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kanade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Maniatis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Bieber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Singh</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1904.01720</idno>
		<title level="m">Neural program repair by jointly learning to localize and repair</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Hoppity: Learning graph transformations to detect and fix bugs in programs</title>
		<author>
			<persName><forename type="first">E</forename><surname>Dinella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Dai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Naik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Learning Representations</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Sorting and transforming program repair ingredients via deep learning code similarities</title>
		<author>
			<persName><forename type="first">M</forename><surname>White</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tufano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Martinez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Monperrus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Poshyvanyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="479" to="490" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Global Relational Models of Source Code</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">J</forename><surname>Hellendoorn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Maniatis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sutton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Bieber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Learning Representations</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Automatic generation of natural language summaries for java classes</title>
		<author>
			<persName><forename type="first">L</forename><surname>Moreno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Aponte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sridhara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Marcus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pollock</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Vijay-Shanker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2013 21st International Conference on Program Comprehension (ICPC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="23" to="32" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Summarizing source code using a neural attention model</title>
		<author>
			<persName><forename type="first">S</forename><surname>Iyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Konstas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cheung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zettlemoyer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics</title>
		<title level="s">Long Papers</title>
		<meeting>the 54th Annual Meeting of the Association for Computational Linguistics</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="2073" to="2083" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Automatically assessing code understandability: How far are we?</title>
		<author>
			<persName><forename type="first">S</forename><surname>Scalabrino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bavota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vendome</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Linares-Vásquez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Poshyvanyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliveto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM International Conference on Automated Software Engineering (ASE), IEEE</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="417" to="427" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Deep code comment generation</title>
		<author>
			<persName><forename type="first">X</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Jin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM 26th International Conference on Program Comprehension (ICPC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="200" to="20010" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Improving automatic source code summarization via deep reinforcement learning</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ying</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering</title>
				<meeting>the 33rd ACM/IEEE International Conference on Automated Software Engineering</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="397" to="407" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<author>
			<persName><forename type="first">U</forename><surname>Alon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Brody</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Levy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yahav</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1808.01400</idno>
		<title level="m">code2seq: Generating sequences from structured representations of code</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Automatic generation of release notes</title>
		<author>
			<persName><forename type="first">L</forename><surname>Moreno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bavota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Di Penta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliveto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Marcus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Canfora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering</title>
				<meeting>the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="484" to="495" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Deep learning code fragments for code clone detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>White</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tufano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vendome</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Poshyvanyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM International Conference on Automated Software Engineering (ASE), IEEE</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="87" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">A survey of machine learning for big code and naturalness</title>
		<author>
			<persName><forename type="first">M</forename><surname>Allamanis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Barr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Devanbu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sutton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys (CSUR)</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="1" to="37" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Language models are unsupervised multitask learners</title>
		<author>
			<persName><forename type="first">A</forename><surname>Radford</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Child</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Luan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Amodei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sutskever</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">OpenAI blog</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">9</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<title level="m" type="main">Language models are few-shot learners</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Brown</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ryder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Subbiah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kaplan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dhariwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Neelakantan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Shyam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sastry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Askell</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2005.14165</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Brockschmidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Allamanis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Gaunt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Polozov</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1805.08490</idno>
		<title level="m">Generative code modeling with graphs</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">An empirical study on learning bug-fixing patches in the wild via neural machine translation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Tufano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Watson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bavota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Penta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>White</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Poshyvanyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Software Engineering and Methodology (TOSEM)</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="1" to="29" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Perfection not required? human-ai partnerships in code translation</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Weisz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Muller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Houde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Richards</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Ross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Martinez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Talamadupula</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IUI 2021</title>
				<meeting>IUI 2021</meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Talamadupula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Houde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Martinez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Muller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Richards</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Weisz</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2012.07581</idno>
		<title level="m">Quality estimation &amp; interpretability for code translation</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">The story in the notebook: Exploratory data science using a literate programming tool</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Kery</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Radensky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Arya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">E</forename><surname>John</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Myers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems</title>
				<meeting>the 2018 CHI Conference on Human Factors in Computing Systems</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Why jupyter is data scientists&apos; computational notebook of choice</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Perkel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nature</title>
		<imprint>
			<biblScope unit="volume">563</biblScope>
			<biblScope unit="page" from="145" to="147" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Leclair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haque</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Mcmillan</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2004.02843</idno>
		<title level="m">Improved code summarization via a graph neural network</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Achieving saturation in thematic analysis: Development and refinement of a codebook</title>
		<author>
			<persName><forename type="first">H</forename><surname>Ando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Cousins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Young</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comprehensive Psychology</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page">3</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Using thematic analysis in psychology</title>
		<author>
			<persName><forename type="first">V</forename><surname>Braun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Clarke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Qualitative research in psychology</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="77" to="101" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Understanding the impact of tvis on technology use and selection by children with visual impairments</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Baker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">R</forename><surname>Milne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Ladner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</title>
				<meeting>the 2019 CHI Conference on Human Factors in Computing Systems</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Understanding older adults&apos; participation in design workshops</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pradhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Jelen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Siek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lazar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</title>
				<meeting>the 2020 CHI Conference on Human Factors in Computing Systems</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">How many interviews are enough? an experiment with data saturation and variability</title>
		<author>
			<persName><forename type="first">G</forename><surname>Guest</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bunce</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Johnson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Field methods</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="59" to="82" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Achieving data saturation: evidence from a qualitative study of job satisfaction</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A A</forename><surname>Majid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Othman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">F</forename><surname>Mohamad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A H</forename><surname>Lim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Social and Management Research Journal</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="66" to="77" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<monogr>
		<title level="m" type="main">Understanding and Using English Grammar: Workbook</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Azar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Azar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Koch</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Longman</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">A figure of thought</title>
		<author>
			<persName><forename type="first">G</forename><surname>Lakoff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Metaphor and symbol</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="215" to="225" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<monogr>
		<author>
			<persName><forename type="first">K.-H</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Shoeybi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M.-Y</forename><surname>Liu</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2003.00674</idno>
		<title level="m">Style exampleguided text generation using generative adversarial transformers</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b54">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Almasan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Suárez-Varela</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Badia-Sampera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Rusek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Barlet-Ros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cabellos-Aparicio</surname></persName>
		</author>
		<idno>arXiv-1910</idno>
		<title level="m">Deep reinforcement learning meets graph neural networks: exploring a routing optimization use case</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Raffel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Shazeer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Roberts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Narang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Matena</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Liu</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1910.10683</idno>
		<title level="m">Exploring the limits of transfer learning with a unified text-totext transformer</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">Scenario-based analysis of software architecture</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kazman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Abowd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bass</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Clements</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE software</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="47" to="55" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Uncertainty, action, and interaction: In pursuit of mixed-initiative computing</title>
		<author>
			<persName><forename type="first">E</forename><surname>Horvitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Intelligent Systems</title>
		<imprint>
			<biblScope unit="page" from="17" to="20" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Voice user interface principles for a conversational agent</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Brownholtz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Armes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9th International Conference on Intelligent User Interfaces</title>
				<meeting>the 9th International Conference on Intelligent User Interfaces</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="364" to="365" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<analytic>
		<title level="a" type="main">A multipleapplication conversational agent</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Brownholtz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Armes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9th International Conference on Intelligent User Interfaces</title>
				<meeting>the 9th International Conference on Intelligent User Interfaces</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="319" to="321" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<monogr>
		<title level="m" type="main">A comparison of greedy search algorithms</title>
		<author>
			<persName><forename type="first">C</forename><surname>Wilt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Thayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Ruml</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b61">
	<analytic>
		<title level="a" type="main">An o(nd) difference algorithm and its variations</title>
		<author>
			<persName><forename type="first">E</forename><surname>Myers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Algorithmica</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="251" to="266" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
