{"id":2615,"date":"2019-08-27T14:52:13","date_gmt":"2019-08-27T23:52:13","guid":{"rendered":"http:\/\/prg.is.titech.ac.jp\/?page_id=2615"},"modified":"2020-01-30T17:44:42","modified_gmt":"2020-01-31T02:44:42","slug":"dnn-completion","status":"publish","type":"page","link":"https:\/\/prg.is.titech.ac.jp\/ja\/projects\/software-development-environment\/dnn-completion\/","title":{"rendered":"\u6df1\u5c64\u5b66\u7fd2\u3092\u7528\u3044\u305f\u30b3\u30fc\u30c9\u88dc\u5b8c"},"content":{"rendered":"<p>\u5897\u539f\u82f1\u5f66\" target=\"_blank\" rel=\"noopener\">Hidehiko Masuhara<\/a>. ASTToken2Vec: An embedding method for neural code completion. In Kei Ito, editor, <em>Proceedings of the 36th JSSST Annual Conference<\/em>, pages No.\u00a013\u2013L. Japan Society for Software Science and Technology (JSSST), August 2019. <a href=\"https:\/\/jssst2019.wordpress.com\/\">The Student Research Award and the Best Presentation Award of the conference.<\/a> [\u00a0<a href=\"https:\/\/prg.is.titech.ac.jp\/members\/masuhara\/papers\/masuhara_bib.html#li2019jssst\">bib<\/a>\u00a0| <a href=\"https:\/\/prg.is.titech.ac.jp\/members\/masuhara\/papers\/jssst2019completion.pdf\">.pdf<\/a>\u00a0]<\/li>\n<\/ul>\n<p>\u3053\u306e\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306f\u6df1\u5c64\u5b66\u7fd2\u3092\u7528\u3044\u305f\u30b3\u30fc\u30c9\u88dc\u5b8c\u6a5f\u80fd\u3092\u3001\u65b0\u305f\u306a\u7b26\u53f7\u5316\u624b\u6cd5\u3068\u57cb\u3081\u8fbc\u307f\u624b\u6cd5\u306b\u3088\u3063\u3066\u6539\u5584\u3059\u308b\u3053\u3068\u3092\u76ee\u6307\u3057\u307e\u3059\u3002<\/p>\n<p>\u30b3\u30fc\u30c9\u88dc\u5b8c\u306f\u30b3\u30fc\u30c9\u30a8\u30c7\u30a3\u30bf\u306e\u6a5f\u80fd\u306e1\u3064\u3067\u3001\u9014\u4e2d\u307e\u3067\u5165\u529b\u3055\u308c\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u6b8b\u308a\u3092\u88dc\u3063\u3066\u304f\u308c\u308b\u3082\u306e\u3067\u3059\u3002\u8fd1\u5e74\u6ce8\u76ee\u3055\u308c\u3066\u3044\u308b\u624b\u6cd5\u306e1\u3064\u306f\u3001\u7d71\u8a08\u7684\u624b\u6cd5\u3042\u308b\u3044\u306f\u6df1\u5c64\u5b66\u7fd2\u3092\u7528\u3044\u3066\u3001\u5165\u529b\u9014\u4e2d\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u306b\u7d9a\u304f\u78ba\u7387\u304c\u9ad8\u3044\u3082\u306e\u3092\u88dc\u3046\u3082\u306e\u3067\u3059\u3002\u3053\u306e\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3067\u306f\u3001\u57cb\u3081\u8fbc\u307f\u624b\u6cd5(\u30d7\u30ed\u30b0\u30e9\u30e0\u4e2d\u306e\u5b57\u53e5\u3068\u795e\u7d4c\u56de\u8def\u7db2\u306e\u5165\u51fa\u529b\u306b\u7528\u3044\u308b\u30d9\u30af\u30c8\u30eb\u3092\u76f8\u4e92\u5909\u63db\u3059\u308b\u65b9\u6cd5)\u3068\u3057\u3066Word2Vec\u306b\u7740\u60f3\u3092\u5f97\u305f\u65b9\u6cd5\u3092\u63d0\u6848\u3057\u3001\u62bd\u8c61\u69cb\u6587\u6728\u306e\u60c5\u5831\u3092\u6d3b\u7528\u3057\u305f\u7b26\u53f7\u5316\u3092\u7528\u3044\u3066LSTM\u6df1\u5c64\u5b66\u7fd2\u6a5f\u3092\u7528\u3044\u308b\u3053\u3068\u3092\u8a66\u307f\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u3063\u3066\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u6587\u6cd5\u3068\u3001\u985e\u7fa9\u8a9e\u3092\u3088\u308a\u4e0a\u624b\u304f\u7528\u3044\u305f\u88dc\u5b8c\u3092\u884c\u308f\u305b\u308b\u3053\u3068\u3092\u72d9\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u8ad6\u6587:<\/p>\n<ul>\n<li>[<a name=\"li2019jssst\"><\/a>LM19]Dongfang Li and <a href=\"https:\/\/prg.is.titech.ac.jp\/ja\/people\/masuhara\/\" data-internallinksmanager029f6b8e52c=\"285\" title=\"\u5897\u539f\u82f1\u5f66\" target=\"_blank\" rel=\"noopener\">Hidehiko Masuhara<\/a>. ASTToken2Vec: An embedding method for neural code completion. In Kei Ito, editor, <em>Proceedings of the 36th JSSST Annual Conference<\/em>, pages No.\u00a013\u2013L. Japan Society for Software Science and Technology (JSSST), August 2019. <a href=\"https:\/\/jssst2019.wordpress.com\/\">The Student Research Award and the Best Presentation Award of the conference.<\/a> [\u00a0<a href=\"https:\/\/prg.is.titech.ac.jp\/members\/masuhara\/papers\/masuhara_bib.html#li2019jssst\">bib<\/a>\u00a0| <a href=\"https:\/\/prg.is.titech.ac.jp\/members\/masuhara\/papers\/jssst2019completion.pdf\">.pdf<\/a>\u00a0]<\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u5897\u539f\u82f1\u5f66&#8221; target=&#8221;_blank&#8221; rel=&#8221;noopener&#8221;>Hidehiko Masuhara. ASTToken2Vec: An embedding method for neural code comp&hellip; <a class=\"continue\" href=\"https:\/\/prg.is.titech.ac.jp\/ja\/projects\/software-development-environment\/dnn-completion\/\">Continue Reading \u6df1\u5c64\u5b66\u7fd2\u3092\u7528\u3044\u305f\u30b3\u30fc\u30c9\u88dc\u5b8c<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2585,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-2615","page","type-page","status-publish","hentry","radius"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/pages\/2615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/comments?post=2615"}],"version-history":[{"count":2,"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/pages\/2615\/revisions"}],"predecessor-version":[{"id":2617,"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/pages\/2615\/revisions\/2617"}],"up":[{"embeddable":true,"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/pages\/2585"}],"wp:attachment":[{"href":"https:\/\/prg.is.titech.ac.jp\/ja\/wp-json\/wp\/v2\/media?parent=2615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}