{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:37:29Z","timestamp":1771576649405,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642005923","type":"print"},{"value":"9783642005930","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00593-0_26","type":"book-chapter","created":{"date-parts":[[2009,3,27]],"date-time":"2009-03-27T06:26:08Z","timestamp":1238135168000},"page":"385-400","source":"Crossref","is-referenced-by-count":92,"title":["SNIFF: A Search Engine for Java Using Free-Form Queries"],"prefix":"10.1007","author":[{"given":"Shaunak","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Sudeep","family":"Juvekar","sequence":"additional","affiliation":[]},{"given":"Koushik","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Ammons, G., Bodik, R., Larus, J.R.: Mining specifications. In: POPL 2002, pp. 4\u201316 (2002)","DOI":"10.1145\/503272.503275"},{"issue":"1\u20137","key":"26_CR2","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S. Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems\u00a030(1\u20137), 107\u2013117 (1998)","journal-title":"Computer Networks and ISDN Systems"},{"key":"26_CR3","unstructured":"Krugle inc, http:\/\/www.krugle.com"},{"key":"26_CR4","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to algorithms. MIT press\/ McGraw-Hill (2001)"},{"key":"26_CR5","unstructured":"Google code search, http:\/\/google.com\/codesearch"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","first-page":"117","volume-title":"Software Engineering Education in the Modern Age","author":"R. Holmes","year":"2006","unstructured":"Holmes, R., Murphy, G.: Using structural context to recommend source code examples. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, vol.\u00a04309, pp. 117\u2013125. Springer, Heidelberg (2006)"},{"issue":"12","key":"26_CR7","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1109\/TSE.2006.117","volume":"32","author":"R. Holmes","year":"2006","unstructured":"Holmes, R., Walker, R., Murphy, G.: Approximate structural context matching: An approach to recommend relevant examples. IEEE Transactions on Software Engineering\u00a032(12), 952\u2013970 (2006)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"26_CR8","unstructured":"Java frequently asked questions, http:\/\/www.javafaq.com\/"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate tree-based detection of code clones. In: ICSE 2007, pp. 96\u2013105 (2007)","DOI":"10.1109\/ICSE.2007.30"},{"key":"26_CR10","unstructured":"Koders inc, http:\/\/www.koders.com"},{"key":"26_CR11","unstructured":"Kremenek, T., Twohey, P., Back, G., Ng, A., Engler, D.: From uncertainty to belief: inferring the specification within. In: OSDI 2006, pp. 161\u2013176 (2006)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Mandelin, D., Xu, L., Bod\u00edk, R., Kimelman, D.: Jungloid mining: helping to navigate the api jungle. In: PLDI 2005, pp. 48\u201361 (2005)","DOI":"10.1145\/1065010.1065018"},{"issue":"3","key":"26_CR13","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/TSE.2005.38","volume":"31","author":"M. Matsushita","year":"2005","unstructured":"Matsushita, M., Inoue, K., Yokomori, R., Yamamoto, T., Kusumoto, S.: Ranking significance of software components based on use relations. IEEE Trans. Softw. Eng.\u00a031(3), 213\u2013225 (2005)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Porter, M.F.: An algorithm for suffix stripping. In: Readings in information retrieval, vol.\u00a014, pp. 130\u2013137 (1980)","DOI":"10.1108\/eb046814"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1081706.1081711","volume-title":"ESEC\/FSE-13: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering","author":"M.P. Robillard","year":"2005","unstructured":"Robillard, M.P.: Automatic generation of suggestions for program investigation. In: ESEC\/FSE-13: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, pp. 11\u201320. ACM, New York (2005)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Sahavechaphan, N., Claypool, K.: Xsnippet: mining for sample code. In: OOPSLA 2006, pp. 413 \u2013 430 (2006)","DOI":"10.1145\/1167473.1167508"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Tan, L., Yuan, D., Krishna, G., Zhou, Y.: \/*icomment: bugs or bad comments?*\/. In: SOSP 2007, pp. 145\u2013158 (2007)","DOI":"10.1145\/1323293.1294276"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Thummalapenta, S., Xie, T.: PARSEWeb: A programmer assistant for reusing open source code on the web. In: ASE 2007, pp. 204\u2013213 (2007)","DOI":"10.1145\/1321631.1321663"},{"key":"26_CR19","unstructured":"Woodfield, S., Dunsmore, H., Shen, V.Y.: The effect of modularization and comments on program comprehension. In: ICSE 2002, pp. 215\u2013223 (1981)"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Ying, A.T.T., Wright, J.L., Abrams, S.: Source code that talks: an exploration of eclipse task comments and their implication to repository mining. In: MSR 2005, pp. 1\u20135 (2005)","DOI":"10.1145\/1083142.1083152"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00593-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T00:19:56Z","timestamp":1558225196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00593-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005923","9783642005930"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00593-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}