{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:15:13Z","timestamp":1773843313321,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,1,29]],"date-time":"2015-01-29T00:00:00Z","timestamp":1422489600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s10664-014-9350-8","type":"journal-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T04:41:22Z","timestamp":1422420082000},"page":"104-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":100,"title":["Linguistic antipatterns: what they are and how developers perceive them"],"prefix":"10.1007","volume":"21","author":[{"given":"Venera","family":"Arnaoudova","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,29]]},"reference":[{"key":"9350_CR1","doi-asserted-by":"crossref","unstructured":"Abbes M, Khomh F, Gu\u00e9h\u00e9neuc YG, Antoniol G (2011) An empirical study of the impact of two antipatterns, Blob and Spaghetti Code, on program comprehension. In: Proceedings of the European Conference on Software Maintenance and Reengineering (CSMR), pp 181\u2013190","DOI":"10.1109\/CSMR.2011.24"},{"key":"9350_CR2","doi-asserted-by":"crossref","unstructured":"Abebe S, Tonella P (2011) Towards the extraction of domain concepts from the identifiers. In: Proceedings of the Working Conference on Reverse Engineering (WCRE), pp 77\u201386","DOI":"10.1109\/WCRE.2011.19"},{"key":"9350_CR3","doi-asserted-by":"crossref","unstructured":"Abebe S, Tonella P (2013) Automated identifier completion and replacement. In: Proceedings of the European Conference on Software Maintenance and Reengineering (CSMR), pp 263\u2013272","DOI":"10.1109\/CSMR.2013.35"},{"key":"9350_CR4","doi-asserted-by":"crossref","unstructured":"Abebe SL, Haiduc S, Tonella P, Marcus A (2011) The effect of lexicon bad smells on concept location in source code. In: Proceedings of the International Working Conference on Source Code Analysis and Manipulation (SCAM), pp 125\u2013134","DOI":"10.1109\/SCAM.2011.18"},{"key":"9350_CR5","doi-asserted-by":"crossref","unstructured":"Abebe SL, Arnaoudova V, Tonella P, Antoniol G, Gu\u00e9h\u00e9neuc YG (2012) Can lexicon bad smells improve fault prediction? In: Proceedings of the Working Conference on Reverse Engineering (WCRE), pp 235\u2013244","DOI":"10.1109\/WCRE.2012.33"},{"key":"9350_CR6","unstructured":"Anquetil N, Lethbridge T (1998) Assessing the relevance of identifier names in a legacy software system. In: Proceedings of the International Conference of the Centre for Advanced Studies on Collaborative Research (CASCON), pp 213\u2013222"},{"key":"9350_CR7","doi-asserted-by":"crossref","unstructured":"Arnaoudova V, Di Penta M, Antoniol G, Gu\u00e9h\u00e9neuc YG (2013) A new family of software anti-patterns: Linguistic anti-patterns. In: Proceedings of the European Conference on Software Maintenance and Reengineering (CSMR), pp 187\u2013196","DOI":"10.1109\/CSMR.2013.28"},{"issue":"5","key":"9350_CR8","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1109\/TSE.2014.2312942","volume":"40","author":"V Arnaoudova","year":"2014","unstructured":"Arnaoudova V, Eshkevari L, Di Penta M, Oliveto R, Antoniol G, Gu\u00e9h\u00e9neuc YG (2014) Repent: Analyzing the nature of identifier renamings. IEEE Trans Softw Eng (TSE) 40(5):502\u2013532","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"6","key":"9350_CR9","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","volume":"18","author":"R Brooks","year":"1983","unstructured":"Brooks R (1983) Towards a theory of the comprehension of computer programs. In J Man-Machine Stud 18(6):543\u2013554","journal-title":"In J Man-Machine Stud"},{"key":"9350_CR10","volume-title":"Anti patterns: refactoring software, architectures, and projects in crisis","author":"WJ Brown","year":"1998","unstructured":"Brown WJ, Malveau RC, Brown WH, McCormick III HW, Mowbray TJ (1998a) Anti patterns: refactoring software, architectures, and projects in crisis, 1st edn. Wiley, New York","edition":"1"},{"key":"9350_CR11","volume-title":"AntiPatterns: refactoring software, architectures, and projects in crisis","author":"WJ Brown","year":"1998","unstructured":"Brown WJ, Malveau RC, HWM III, Mowbray TJ (1998b) AntiPatterns: refactoring software, architectures, and projects in crisis. Wiley, New York"},{"key":"9350_CR12","doi-asserted-by":"crossref","unstructured":"Caprile B, Tonella P (1999) Nomen est omen: Analyzing the language of function identifiers. In: Proceedings of Working Conference on Reverse Engineering (WCRE), pp 112\u2013122","DOI":"10.1109\/WCRE.1999.806952"},{"key":"9350_CR13","doi-asserted-by":"crossref","unstructured":"Caprile B, Tonella P (2000) Restructuring program identifier names. In: Proceedings of the International Conference on Software Maintenance (ICSM), pp 97\u2013107","DOI":"10.1109\/ICSM.2000.883022"},{"key":"9350_CR14","doi-asserted-by":"crossref","unstructured":"Chaudhary BD, Sahasrabuddhe HV (1980) Meaningfulness as a factor of program complexity. In: Proceedings of the ACM Annual Conference, ACM, ACM \u201980, pp 457\u2013466","DOI":"10.1145\/800176.810001"},{"issue":"2","key":"9350_CR15","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TSE.2010.89","volume":"37","author":"A De Lucia","year":"2011","unstructured":"De Lucia A, Di Penta M, Oliveto R (2011) Improving source code lexicon via traceability and information retrieval. IEEE Trans Softw Eng 37(2):205\u2013227","journal-title":"IEEE Trans Softw Eng"},{"key":"9350_CR16","doi-asserted-by":"crossref","unstructured":"Deissenbock F, Pizka M (2005) Concise and consistent naming. In: Proceedings of the International Workshop on Program Comprehension (IWPC), pp 97\u2013106","DOI":"10.1109\/WPC.2005.14"},{"key":"9350_CR17","volume-title":"Refactoring: improving the design of existing code","author":"M Fowler","year":"1999","unstructured":"Fowler M (1999) Refactoring: improving the design of existing code. Addison-Wesley, MA"},{"key":"9350_CR18","volume-title":"Design patterns: elements of reusable object oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object oriented software. Addison-Wesley, Boston"},{"key":"9350_CR19","unstructured":"Glaser BG (1992) Basics of grounded theory analysis. Sociology Press"},{"key":"9350_CR20","unstructured":"Grissom RJ, Kim JJ (2005) Effect sizes for research: a broad practical approach, 2nd edn. Lawrence Earlbaum Associates"},{"key":"9350_CR21","volume-title":"Survey methodology","author":"RM Groves","year":"2009","unstructured":"Groves RM, Fowler Jr FJ, Couper MP, Lepkowski JM, Singer E, Tourangeau R (2009) Survey methodology, 2nd edn. Wiley, New York","edition":"2"},{"issue":"2","key":"9350_CR22","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/00031305.1998.10480559","volume":"52","author":"JL Hintze","year":"1998","unstructured":"Hintze JL, Nelson RD (1998) Violin plots: a box plot-density trace synergism. Am Stat 52(2):181\u2013184","journal-title":"Am Stat"},{"key":"9350_CR23","doi-asserted-by":"crossref","unstructured":"Jedlitschka A, Pfahl D (2005) Reporting guidelines for controlled experiments in software engineering. In: International symposium on empirical software engineering","DOI":"10.1109\/ISESE.2005.1541818"},{"key":"9350_CR24","doi-asserted-by":"crossref","unstructured":"Khomh F, Di Penta M, Gu\u00e9h\u00e9neuc YG (2009) An exploratory study of the impact of code smells on software change-proneness. In: Proceedings of the working conference on reverse engineering (WCRE), pp 75\u201384","DOI":"10.1109\/WCRE.2009.28"},{"issue":"3","key":"9350_CR25","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh F, Di Penta M, Gu\u00e9h\u00e9neuc YG, Antoniol G (2012) An exploratory study of the impact of antipatterns on class change- and fault-proneness. Empir Softw Eng 17(3):243\u2013275","journal-title":"Empir Softw Eng"},{"issue":"8","key":"9350_CR26","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TSE.2002.1027796","volume":"28","author":"B Kitchenham","year":"2002","unstructured":"Kitchenham B, Pfleeger S, Pickard L, Jones P, Hoaglin D, El Emam K, Rosenberg J (2002) Preliminary guidelines for empirical research in software engineering. IEEE Trans Softw Eng (TSE) 28(8):721\u2013734","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9350_CR27","doi-asserted-by":"crossref","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2006) What\u2019s in a name? a study of identifiers. In: Proceedings of the International Conference on Program Comprehension (ICPC), pp 3\u201312","DOI":"10.1109\/ICPC.2006.51"},{"issue":"4","key":"9350_CR28","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11334-007-0031-2","volume":"3","author":"D Lawrie","year":"2007","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2007) Effective identifier names for comprehension and memory. Innovations Syst Softw Eng 3(4):303\u2013318","journal-title":"Innovations Syst Softw Eng"},{"issue":"4","key":"9350_CR29","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1002\/smr.274","volume":"15","author":"E Merlo","year":"2003","unstructured":"Merlo E, McAdam I, De Mori R (2003) Feed-forward and recurrent neural networks for source code informal information analysis. J Softw Maint 15(4):205\u2013244","journal-title":"J Softw Maint"},{"issue":"11","key":"9350_CR30","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller GA (1995) WordNet: a lexical database for English. Commun ACM 38(11):39\u201341","journal-title":"Commun ACM"},{"issue":"1","key":"9350_CR31","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha N, Gu\u00e9h\u00e9neuc YG, Duchien L, Le Meur AF (2010) DECOR: a method for the specification and detection of code and design smells. IEEE Trans Softw Eng (TSE\u201910) 36(1):20\u201336","journal-title":"IEEE Trans Softw Eng (TSE\u201910)"},{"key":"9350_CR32","doi-asserted-by":"crossref","unstructured":"Nagappan M, Zimmermann T, Bird C (2013) Diversity in software engineering research. In: Proceedings of the joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE), pp 466\u2013476","DOI":"10.1145\/2491411.2491415"},{"key":"9350_CR33","volume-title":"Questionnaire design, interviewing and attitude measurement","author":"AN Oppenheim","year":"1992","unstructured":"Oppenheim AN (1992) Questionnaire design, interviewing and attitude measurement. Pinter, London"},{"key":"9350_CR34","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, De Lucia A, Poshyvanyk D (2013) Detecting bad smells in source code using change history information. In: Proceedings of the international conference on automated software engineering (ASE), pp 268\u2013278","DOI":"10.1109\/ASE.2013.6693086"},{"key":"9350_CR35","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Penta M D, Oliveto R, Lucia A D (2014) Do they really smell bad? A study on developers\u2019 perception of code bad smells. In: International conference on software maintenance and evolution (ICSME), p. to appear","DOI":"10.1109\/ICSME.2014.32"},{"issue":"12","key":"9350_CR36","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TSE.2004.94","volume":"30","author":"J Parsons","year":"2004","unstructured":"Parsons J, Saunders C (2004) Cognitive heuristics in software engineering: applying and extending anchoring and adjustment to artifact reuse. IEEE Trans Softw Eng (TSE) 30(12):873\u2013888","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"6","key":"9350_CR37","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/TSE.2002.1010061","volume":"28","author":"L Prechelt","year":"2002","unstructured":"Prechelt L, Unger-Lamprecht B, Philippsen M, Tichy W (2002) Two controlled experiments assessing the usefulness of design pattern documentation in program maintenance. IEEE Trans Softw Eng (TSE) 28(6):595\u2013606","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9350_CR38","unstructured":"Ra\u0163iu D, Ducasse S, Girba T, Marinescu R (2004) Using history information to improve design flaws detection. In: Proceedings of the European conference on software maintenance and reengineering (CSMR), pp 223\u2013232"},{"issue":"1","key":"9350_CR39","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/356835.356840","volume":"13","author":"BA Sheil","year":"1981","unstructured":"Sheil BA (1981) The psychological study of programming. ACM Comput Surv (CSUR) 13(1):101\u2013120","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"4","key":"9350_CR40","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/S0020-7373(77)80014-X","volume":"9","author":"B Shneiderman","year":"1977","unstructured":"Shneiderman B (1977) Measuring computer program quality and comprehension. Int J Man-Machine Stud 9(4):465\u2013478","journal-title":"Int J Man-Machine Stud"},{"key":"9350_CR41","volume-title":"Towards a cognitive model of progammer behavior, Tech Rep, vol 37","author":"B Shneiderman","year":"1975","unstructured":"Shneiderman B, Mayer R (1975) Towards a cognitive model of progammer behavior, Tech Rep, vol 37. Indiana University, Bloomington"},{"key":"9350_CR42","volume-title":"Guide to advanced empirical software engineering","author":"F Shull","year":"2007","unstructured":"Shull F, Singer J, Sj\u00f8berg DI (eds) (2007) Guide to advanced empirical software engineering. Springer, New York"},{"key":"9350_CR43","doi-asserted-by":"crossref","unstructured":"Strauss AL (1987) Qualitative analysis for social scientists. Cambridge Univsersity Press","DOI":"10.1017\/CBO9780511557842"},{"issue":"3","key":"9350_CR44","first-page":"143","volume":"4","author":"A Takang","year":"1996","unstructured":"Takang A, Grubb PA, Macredie RD (1996) The effects of comments and identifier names on program comprehensibility: an experiential study. J Program Lang 4(3):143\u2013167","journal-title":"J Program Lang"},{"key":"9350_CR45","doi-asserted-by":"crossref","unstructured":"Tan L, Yuan D, Krishna G, Zhou Y (2007) \/*iComment: bugs or bad comments?*\/, Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP) 41(6):145\u2013158","DOI":"10.1145\/1323293.1294276"},{"key":"9350_CR46","doi-asserted-by":"crossref","unstructured":"Tan L, Zhou Y, Padioleau Y (2011) Acomment: mining annotations from comments and code to detect interrupt related concurrency bugs. In: Proceedings of the International Conference on Software Engineering (ICSE)","DOI":"10.1145\/1985793.1985796"},{"key":"9350_CR47","doi-asserted-by":"crossref","unstructured":"Tan SH, Marinov D, Tan L, Leavens GT (2012) @tComment: Testing Javadoc comments to detect comment-code inconsistencies. In: Proceedings of the international conference on software testing, verification and validation (ICST), pp 260\u2013269","DOI":"10.1109\/ICST.2012.106"},{"key":"9350_CR48","doi-asserted-by":"crossref","unstructured":"Torchiano M (2002) Documenting pattern use in java programs. In: Proceedings of the international conference on software maintenance (ICSM), pp 230\u2013233","DOI":"10.1109\/ICSM.2002.1167770"},{"key":"9350_CR49","doi-asserted-by":"crossref","unstructured":"Toutanova K, Manning CD (2000) Enriching the knowledge sources used in a maximum entropy part-of-speech tagger. In: Proceedings of the Joint SIGDAT conference on empirical methods in natural language processing and very large corpora (EMNLP\/VLC-2000), association for computational linguistics, pp 63\u201370","DOI":"10.3115\/1117794.1117802"},{"issue":"6","key":"9350_CR50","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/953233.953237","volume":"9","author":"L Weissman","year":"1974","unstructured":"Weissman L (1974a) Psychological complexity of computer programs: an experimental methodology. SIGPLAN Not 9(6):25\u201336","journal-title":"SIGPLAN Not"},{"key":"9350_CR51","doi-asserted-by":"crossref","unstructured":"Weissman LM (1974b) A methodology for studying the psychological complexity of computer programs. PhD thesis","DOI":"10.1145\/953233.953237"},{"key":"9350_CR52","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in software engineering - an introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2000) Experimentation in software engineering - an introduction. Kluwer, Boston"},{"key":"9350_CR53","unstructured":"Woodfield SN, Dunsmore HE, Shen VY (1981) The effect of modularization and comments on program comprehension. In: Proceedings of the international conference on software engineering (ICSE), pp 215\u2013223"},{"key":"9350_CR54","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2013) Do developers care about code smells? - An exploratory survey. In: Proceedings of the working conference on reverse engineering (WCRE), pp 242\u2013251","DOI":"10.1109\/WCRE.2013.6671299"},{"issue":"3\u20134","key":"9350_CR55","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s10515-011-0082-3","volume":"18","author":"H Zhong","year":"2011","unstructured":"Zhong H, Zhang L, Xie T, Mei H (2011) Inferring specifications for resources from natural language api documentation. Autom Softw Eng 18(3\u20134):227\u2013261","journal-title":"Autom Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9350-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-014-9350-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9350-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T21:49:23Z","timestamp":1747518563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-014-9350-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,29]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["9350"],"URL":"https:\/\/doi.org\/10.1007\/s10664-014-9350-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,29]]}}}