{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:50:59Z","timestamp":1760586659957},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,7,3]],"date-time":"2013-07-03T00:00:00Z","timestamp":1372809600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10664-013-9260-1","type":"journal-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T07:06:13Z","timestamp":1372748773000},"page":"1706-1753","source":"Crossref","is-referenced-by-count":9,"title":["An experimental investigation on the effects of context on source code identifiers splitting and expansion"],"prefix":"10.1007","volume":"19","author":[{"given":"Latifa","family":"Guerrouj","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[]},{"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,3]]},"reference":[{"key":"9260_CR2","unstructured":"Anquetil N, Lethbridge T (1998) Assessing the relevance of identifier names in a legacy software system. In: Proceedings of CASCON, pp\u00a0213\u2013222"},{"key":"9260_CR1","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28:970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"key":"9260_CR7","unstructured":"Baeza-Yates R, Ribeiro-Neto B (1999) Modern information retrieval. Addison-Wesley"},{"key":"9260_CR3","unstructured":"Baker RD (1995) Modern permutation test software. In: Edgington EG (ed) Randomization tests. Marcel Decker"},{"key":"9260_CR4","unstructured":"Basili V, Caldiera G, Rombach DH (1994) The goal question metric paradigm encyclopedia of software engineering. John Wiley and Sons"},{"key":"9260_CR6","doi-asserted-by":"crossref","unstructured":"Binkley D, Davis M, Lawrie D, Morrell C (2009) To camelcase or under_score. In: The 17th IEEE international conference on program comprehension, ICPC 2009. Vancouver, British Columbia, Canada, May 17\u201319, 2009. IEEE Computer Society, pp\u00a0158\u2013167","DOI":"10.1109\/ICPC.2009.5090039"},{"issue":"18","key":"9260_CR5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10664-012-9201-4","volume":"2","author":"D Binkley","year":"2013","unstructured":"Binkley D, Davis M, Lawrie D, Maletic JI, Morrell C, Sharif B (2013) The impact of identifier style on effort and comprehension. Empir Software Eng 2(18):219\u2013276","journal-title":"Empir Software Eng"},{"key":"9260_CR9","doi-asserted-by":"crossref","unstructured":"Caprile B, Tonella P (1999) Nomen est omen: analyzing the language of function identifiers. In: Proc. of the working conference on reverse engineering (WCRE). Atlanta, Georgia, USA, pp\u00a0112\u2013122","DOI":"10.1109\/WCRE.1999.806952"},{"key":"9260_CR10","doi-asserted-by":"crossref","unstructured":"Caprile B, Tonella P (2000) Restructuring program identifier names. In: Proc. of the International Conference on Software Maintenance (ICSM), pp\u00a097\u2013107","DOI":"10.1109\/ICSM.2000.883022"},{"key":"9260_CR12","doi-asserted-by":"crossref","unstructured":"Dei\u00dfenb\u00f6ck F, Pizka M (2005) Concise and consistent naming. In: Proc. of the International Workshop on Program Comprehension (IWPC)","DOI":"10.1109\/WPC.2005.14"},{"key":"9260_CR11","doi-asserted-by":"crossref","unstructured":"Dit B, Guerrouj L, Poshyvanyk D, Antoniol G (2011) Can better identifier splitting techniques help feature location? In: Proc. of the International Conference on Program Comprehension (ICPC). Kingston, pp 11\u201320","DOI":"10.1109\/ICPC.2011.47"},{"key":"9260_CR13","doi-asserted-by":"crossref","unstructured":"Enslen E, Hill E, Pollock LL, Vijay-Shanker K (2009) Mining source code to automatically split identifiers for software analysis. In: Proceedings of the 6th international working conference on mining software repositories, MSR 2009. Vancouver, BC, Canada, May 16\u201317, pp\u00a071\u201380","DOI":"10.1109\/MSR.2009.5069482"},{"key":"9260_CR14","unstructured":"Grissom RJ, Kim JJ (2005) Effect sizes for research: a broad practical approach, 2nd edn. Lawrence Earlbaum Associates"},{"issue":"6","key":"9260_CR15","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1002\/smr.539","volume":"25","author":"L Guerrouj","year":"2013","unstructured":"Guerrouj L, Di Penta M, Antoniol G, Gu\u00e9h\u00e9neuc YG (2013) TIDIER: an identifier splitting approach using speech recognition techniques. J Softw Evol Process 25(6):569\u2013661","journal-title":"J Softw Evol Process"},{"key":"9260_CR16","first-page":"65","volume":"6","author":"A Holm","year":"1979","unstructured":"Holm A (1979) A simple sequentially rejective Bonferroni test procedure. Scand J Stat 6:65\u201370","journal-title":"Scand J Stat"},{"key":"9260_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1181775.1181777","volume-title":"SIGSOFT \u201906\/FSE-14: proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering","author":"M Kersten","year":"2006","unstructured":"Kersten M, Murphy GC (2006) Using task context to improve programmer productivity. In: SIGSOFT \u201906\/FSE-14: proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering. ACM Press, Portland, Oregon, pp\u00a01\u201311"},{"key":"9260_CR19","doi-asserted-by":"crossref","unstructured":"Lawrie D, Binkley D (2011) Expanding identifiers to normalize source code vocabulary. In: Proc. of the International Conference on Software Maintenance (ICSM), pp\u00a0113\u2013122","DOI":"10.1109\/ICSM.2011.6080778"},{"key":"9260_CR21","doi-asserted-by":"crossref","unstructured":"Lawrie D, Feild H, Binkley D (2006a) Syntactic identifier conciseness and consistency. In: 6th IEEE international workshop on source code analysis and manipulation. Philadelphia, Pennsylvania, USA, pp\u00a0139\u2013148","DOI":"10.1109\/SCAM.2006.31"},{"key":"9260_CR22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/ICPC.2006.51","volume-title":"Proceedings of 14th IEEE international conference on program comprehension","author":"D Lawrie","year":"2006","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2006b) What\u2019s in a name? A study of identifiers. In: Proceedings of 14th IEEE international conference on program comprehension. IEEE CS Press, Athens, pp\u00a03\u201312"},{"issue":"4","key":"9260_CR23","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11334-007-0031-2","volume":"3","author":"D Lawrie","year":"2007","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2007) Effective identifier names for comprehension and memory. Innov Syst Softw Eng 3(4):303\u2013318","journal-title":"Innov Syst Softw Eng"},{"key":"9260_CR20","doi-asserted-by":"crossref","unstructured":"Lawrie DJ, Binkley D, Morrell C (2010) Normalizing source code vocabulary. In: Proc. of the Working Conference on Reverse Engineering (WCRE), pp 112\u2013122","DOI":"10.1109\/WCRE.2010.10"},{"key":"9260_CR24","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/1321631.1321667","volume-title":"Proceedings of the 22nd IEEE\/ACM international conference on automated software engineering","author":"D Liu","year":"2007","unstructured":"Liu D, Marcus A, Poshyvanyk D, Rajlich V (2007) Feature location via information retrieval based filtering of a single scenario execution trace. In: Proceedings of the 22nd IEEE\/ACM international conference on automated software engineering. ACM, New York, NY, pp\u00a0234\u2013243"},{"key":"9260_CR30","doi-asserted-by":"crossref","unstructured":"Madani N, Guerrouj L, Di Penta M, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2010) Recognizing words from source code identifiers using speech recognition techniques. In: Proceedings of the conference on software maintenance and reengineering. IEEE, pp\u00a069\u201378","DOI":"10.1109\/CSMR.2010.31"},{"key":"9260_CR17","unstructured":"Maletic JI, Marcus A (2001) Supporting program comprehension using semantic and structural information. In: Proc. of 23rd international conference on software engineering. Toronto, pp\u00a0103\u2013112"},{"key":"9260_CR25","first-page":"53","volume-title":"ICPC \u201908: Proceedings of the 2008 the 16th IEEE international conference on program comprehension","author":"E Marc","year":"2008","unstructured":"Marc E, Alfred A, Giuliano A, Gu\u00e9h\u00e9neuc Y-G (2008) Cerberus: tracing requirements to source code using information retrieval dynamic analysis and program analysis. In: ICPC \u201908: Proceedings of the 2008 the 16th IEEE international conference on program comprehension. IEEE Computer Society, Washington DC pp\u00a053\u201362"},{"issue":"5","key":"9260_CR27","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1142\/S0218194005002543","volume":"15","author":"A Marcus","year":"2005","unstructured":"Marcus A, Maletic JI, Sergeyev A (2005) Recovery of traceability links between software documentation and source code. Int J Softw Eng Knowl Eng 15(5):811\u2013836","journal-title":"Int J Softw Eng Knowl Eng"},{"issue":"4","key":"9260_CR26","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1002\/smr.274","volume":"15","author":"E Merlo","year":"2003","unstructured":"Merlo E, McAdam I, De Mori R (2003) Feed-forward and recurrent neural networks for source code informal information analysis. J Softw Maint 15(4):205\u2013244","journal-title":"J Softw Maint"},{"issue":"2","key":"9260_CR29","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/TASSP.1984.1164320","volume":"32","author":"H Ney","year":"1984","unstructured":"Ney H (1984) The use of a one-stage dynamic programming algorithm for connected word recognition. IEEE Trans Acoust Speech Signal Process 32(2):263\u2013271","journal-title":"IEEE Trans Acoust Speech Signal Process"},{"issue":"6","key":"9260_CR31","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk D, Gu\u00e9h\u00e9neuc Y-G, Marcus A, Antoniol G, Rajlich V (2007) Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans Software Eng 33(6):420\u2013432","journal-title":"IEEE Trans Software Eng"},{"key":"9260_CR32","unstructured":"R Core Team (2012) R: a language and environment for statistical computing. Vienna, Austria. ISBN\u00a03-900051-07-0"},{"issue":"1","key":"9260_CR34","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TSE.2009.69","volume":"36","author":"F Ricca","year":"2010","unstructured":"Ricca F, Di Penta M, Torchiano M, Tonella P, Ceccato M (2010) How developers\u2019 experience and ability influence web application comprehension tasks supported by uml stereotypes: a series of four experiments. IEEE Trans Softw Eng 36(1):96\u2013118","journal-title":"IEEE Trans Softw Eng"},{"issue":"12","key":"9260_CR33","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TSE.2004.101","volume":"30","author":"MP Robillard","year":"2004","unstructured":"Robillard MP, Coelho W, Murphy GC (2004) How effective developers investigate source code: anexploratory study. IEEE Trans Softw Eng 30(12):889\u2013903","journal-title":"IEEE Trans Softw Eng"},{"key":"9260_CR37","doi-asserted-by":"crossref","unstructured":"Sharif B, Maletic JI (2010) An eye tracking study on camelcase and under_score identifier styles. In: Proceedings of the international conference on program comprehension, pp\u00a0196\u2013205","DOI":"10.1109\/ICPC.2010.41"},{"key":"9260_CR36","unstructured":"Sheskin DJ (2007) Handbook of parametric and nonparametric statistical procedures, 4th\u00a0edn. Chapman & Hall"},{"key":"9260_CR38","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TSE.2008.26","volume":"34","author":"J Sillito","year":"2008","unstructured":"Sillito J, Murphy GC, De Volder K (2008) Asking and answering questions during a programming change task. IEEE Trans Softw Eng 34:434\u2013451","journal-title":"IEEE Trans Softw Eng"},{"issue":"11","key":"9260_CR35","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1145\/182.358436","volume":"26","author":"E Soloway","year":"1983","unstructured":"Soloway E, Bonar J, Ehrlich K (1983) Cognitive strategies and looping constructs: an empirical study. Commun ACM 26(11):853\u2013860","journal-title":"Commun ACM"},{"key":"9260_CR39","unstructured":"Storey MAD (1998) A cognitive framework for describing and evaluating software exploration tools. PhD thesis Simon Fraser University"},{"issue":"3","key":"9260_CR40","first-page":"143","volume":"4","author":"A Takang","year":"1996","unstructured":"Takang A, Grubb PA, Macredie RD (1996) The effects of comments and identifier names on program comprehensibility: an experiential study. J Program Lang 4(3):143\u2013167","journal-title":"J Program Lang"},{"issue":"8","key":"9260_CR41","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/2.402076","volume":"28","author":"A Mayrhauser von","year":"1995","unstructured":"von Mayrhauser A, Vans AM (1995) Program comprehension during software maintenance and evolution. IEEE Comput 28(8):44\u201355","journal-title":"IEEE Comput"},{"key":"9260_CR8","doi-asserted-by":"crossref","unstructured":"Wohlin C, Runeson P, Host M, Ohlsson MC, Regnell B, Wesslen A (2000) Experimentation in software engineering\u2014an introduction. Kluwer Academic Publishers","DOI":"10.1007\/978-1-4615-4625-2"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9260-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-013-9260-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9260-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,2]],"date-time":"2023-07-02T20:37:12Z","timestamp":1688330232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-013-9260-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,3]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9260"],"URL":"https:\/\/doi.org\/10.1007\/s10664-013-9260-1","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,3]]}}}