{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:02Z","timestamp":1763468042704,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642226540"},{"type":"electronic","value":"9783642226557"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22655-7_7","type":"book-chapter","created":{"date-parts":[[2011,7,18]],"date-time":"2011-07-18T13:37:43Z","timestamp":1310996263000},"page":"130-154","source":"Crossref","is-referenced-by-count":29,"title":["Improving the Tokenisation of Identifier Names"],"prefix":"10.1007","author":[{"given":"Simon","family":"Butler","sequence":"first","affiliation":[]},{"given":"Michel","family":"Wermelinger","sequence":"additional","affiliation":[]},{"given":"Yijun","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Helen","family":"Sharp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"156","volume-title":"18th Int\u2019l Conf. on Program Comprehension","author":"S. Abebe","year":"2010","unstructured":"Abebe, S., Tonella, P.: Natural language parsing of program element names for concept extraction. In: 18th Int\u2019l Conf. on Program Comprehension, pp. 156\u2013159. IEEE, Los Alamitos (2010)"},{"issue":"10","key":"7_CR2","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G. Antoniol","year":"2002","unstructured":"Antoniol, G., Canfora, G., Casazza, G., De Lucia, A., Merlo, E.: Recovering traceability links between code and documentation. IEEE Transactions on Software Engineering\u00a028(10), 970\u2013983 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"7_CR3","first-page":"14","volume-title":"Proc. of Int\u2019l Conf. on Software Maintenance","author":"G. Antoniol","year":"2007","unstructured":"Antoniol, G., Gueheneuc, Y.G., Merlo, E., Tonella, P.: Mining the lexicon used by programmers during sofware [sic] evolution. In: Proc. of Int\u2019l Conf. on Software Maintenance, pp. 14\u201323. IEEE, Los Alamitos (2007)"},{"key":"7_CR4","unstructured":"Atkinson, K.: SCOWL readme (2004), \n                    \n                      http:\/\/wordlist.sourceforge.net\/scowl-readme"},{"key":"7_CR5","first-page":"159","volume-title":"Proc. of the 14th European Conf. on Software Maintenance and Reengineering","author":"S. Butler","year":"2010","unstructured":"Butler, S., Wermelinger, M., Yu, Y., Sharp, H.: Exploring the influence of identifier names on code quality: an empirical study. In: Proc. of the 14th European Conf. on Software Maintenance and Reengineering, pp. 159\u2013168. IEEE Computer Society, Los Alamitos (2010)"},{"key":"7_CR6","first-page":"112","volume-title":"Proc. Sixth Working Conf. on Reverse Engineering","author":"B. Caprile","year":"1999","unstructured":"Caprile, B., Tonella, P.: Nomen est omen: analyzing the language of function identifiers. In: Proc. Sixth Working Conf. on Reverse Engineering, pp. 112\u2013122. IEEE, Los Alamitos (1999)"},{"key":"7_CR7","first-page":"71","volume-title":"6th IEEE International Working Conference on Mining Software Repositories","author":"E. Enslen","year":"2009","unstructured":"Enslen, E., Hill, E., Pollock, L., Vijay-Shanker, K.: Mining source code to automatically split identifiers for software analysis. In: 6th IEEE International Working Conference on Mining Software Repositories, pp. 71\u201380. IEEE, Los Alamitos (2009)"},{"key":"7_CR8","unstructured":"Feild, H., Lawrie, D., Binkley, D.: An empirical comparison of techniques for extracting concept abbreviations from identifiers. In: Proc. of Int\u2019l Conf. on Software Engineering and Applications (2006)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-00434-6_20","volume-title":"Software Language Engineering","author":"E.W. H\u00f8st","year":"2009","unstructured":"H\u00f8st, E.W., \u00d8stvold, B.M.: The Java Programmer\u2019s Phrase Book. In: Ga\u0161evi\u0107, D., L\u00e4mmel, R., Van Wyk, E. (eds.) SLE 2008. LNCS, vol.\u00a05452, pp. 322\u2013341. Springer, Heidelberg (2009)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-642-03013-0_14","volume-title":"ECOOP 2009 \u2013 Object-Oriented Programming","author":"E.W. H\u00f8st","year":"2009","unstructured":"H\u00f8st, E.W., \u00d8stvold, B.M.: Debugging method names. In: Drossopoulou, S. (ed.) ECOOP 2009. LNCS, vol.\u00a05653, pp. 294\u2013317. Springer, Heidelberg (2009)"},{"issue":"3","key":"7_CR11","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.infsof.2006.10.017","volume":"49","author":"A. Kuhn","year":"2007","unstructured":"Kuhn, A., Ducasse, S., G\u00edrba, T.: Semantic clustering: Identifying topics in source code. Information and Software Technology\u00a049(3), 230\u2013243 (2007)","journal-title":"Information and Software Technology"},{"issue":"4","key":"7_CR12","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10664-006-9032-2","volume":"12","author":"D. Lawrie","year":"2007","unstructured":"Lawrie, D., Feild, H., Binkley, D.: Quantifying identifier quality: an analysis of trends. Empirical Software Engineering\u00a012(4), 359\u2013388 (2007)","journal-title":"Empirical Software Engineering"},{"issue":"8","key":"7_CR13","first-page":"707","volume":"10","author":"V.I. Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Cybernetics and Control Theory\u00a010(8), 707\u2013710 (1966)","journal-title":"Cybernetics and Control Theory"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Ma, H., Amor, R., Tempero, E.: Indexing the Java API using source code. In: 19th Australian Conf. on Software Engineering, pp. 451\u2013460 (March 2008)","DOI":"10.1109\/ASWEC.2008.4483234"},{"key":"7_CR15","first-page":"69","volume-title":"Proc. of the Conf. on Software Maintenance and Reengineering","author":"N. Madani","year":"2010","unstructured":"Madani, N., Guerrouj, L., Penta, M.D., Gu\u00e9h\u00e9neuc, Y.G., Antoniol, G.: Recognizing words from source code identifiers using speech recognition techniques. In: Proc. of the Conf. on Software Maintenance and Reengineering, pp. 69\u201378. IEEE, Los Alamitos (2010)"},{"key":"7_CR16","first-page":"33","volume-title":"Proc. 13th Int\u2019l Workshop on Program Comprehension","author":"A. Marcus","year":"2005","unstructured":"Marcus, A., Rajlich, V., Buchta, J., Petrenko, M., Sergeyev, A.: Static techniques for concept location in object-oriented code. In: Proc. 13th Int\u2019l Workshop on Program Comprehension, pp. 33\u201342. IEEE, Los Alamitos (2005)"},{"key":"7_CR17","first-page":"203","volume-title":"Proc. of the 12th European Conf. on Software Maintenance and Reengineering","author":"D. Ra\u0163iu","year":"2008","unstructured":"Ra\u0163iu, D., Feilkas, M., J\u00fcrjens, J.: Extracting domain ontologies from domain specific apis. In: Proc. of the 12th European Conf. on Software Maintenance and Reengineering, pp. 203\u2013212. IEEE Computer Society, Los Alamitos (2008)"},{"key":"7_CR18","first-page":"67","volume-title":"Int\u2019l Working Conf. on Source Code Analysis and Manipulation","author":"J. Singer","year":"2008","unstructured":"Singer, J., Kirkham, C.: Exploiting the correspondence between micro patterns and class names. In: Int\u2019l Working Conf. on Source Code Analysis and Manipulation, pp. 67\u201376. IEEE, Los Alamitos (2008)"},{"key":"7_CR19","unstructured":"Sun Microsystems: Code conventions for the Java programming language (1999), \n                    \n                      http:\/\/java.sun.com\/docs\/codeconv"},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511585852","volume-title":"The Elements of Java Style","author":"A. Vermeulen","year":"2000","unstructured":"Vermeulen, A., Ambler, S.W., Bumgardner, G., Metz, E., Misfeldt, T., Shur, J., Thompson, P.: The Elements of Java Style. Cambridge University Press, Cambridge (2000)"}],"container-title":["Lecture Notes in Computer Science","ECOOP 2011 \u2013 Object-Oriented Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22655-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T03:33:11Z","timestamp":1553916791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22655-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226540","9783642226557"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22655-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}