{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:48:58Z","timestamp":1771703338523,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,3,7]],"date-time":"2015-03-07T00:00:00Z","timestamp":1425686400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s10664-015-9369-5","type":"journal-article","created":{"date-parts":[[2015,3,6]],"date-time":"2015-03-06T03:02:55Z","timestamp":1425610975000},"page":"565-604","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Automatic identifier inconsistency detection using code dictionary"],"prefix":"10.1007","volume":"21","author":[{"given":"Suntae","family":"Kim","sequence":"first","affiliation":[]},{"given":"Dongsun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,7]]},"reference":[{"key":"9369_CR1","unstructured":"Dei\u03b2enb\u00f6ck F, Pizka M (2005) Concise and Consistent Naming. In: Proceedings of International Workshop on Program Comprehension(IWPC), St. Louis, pp 261\u2013282"},{"key":"9369_CR2","doi-asserted-by":"crossref","unstructured":"Lawrie D, Field H, Binkley D (2006) Syntactic Identifier Conciseness and Consistency. In: Proceedings of IEEE International Workshop on Source Code Analysis and Manipulation(SCAM). Philadelphia, Pennsylvania, pp 139\u2013148","DOI":"10.1109\/SCAM.2006.31"},{"key":"9369_CR3","unstructured":"Martin RC (2008) Clean Code: A Handbook of Agile Software Craftsmanship, 1st edn. Prentice Hall"},{"key":"9369_CR4","doi-asserted-by":"crossref","unstructured":"Higo Y, Kusumoto S (2012) How Often Do Unintended Inconsistencies Happen?-Deriving Modification Pattern and Detecting Overlooked Code Fragments-. In: Proceedings of the 28th international conference on software maintenance, Trento, pp 222\u2013231","DOI":"10.1109\/ICSM.2012.6405275"},{"key":"9369_CR5","unstructured":"Abebe SF, Haiduc S, Tonella P, Marcus A (2008) Lexicon Bad Smells in Software. In: Proceedings of working conference on reverse engineering, Antwerp Belgium, pp 95\u201399"},{"issue":"12","key":"9369_CR6","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1052883.1052888","volume":"39","author":"E Hughes","year":"2004","unstructured":"Hughes E (2004) Checking Spelling in Source Code. IEEE Software, ACM SIGPLAN Not 39(12):32\u201338","journal-title":"IEEE Software, ACM SIGPLAN Not"},{"key":"9369_CR7","unstructured":"Delorey DP, Kutson CD, Davies M (2009) Mining Programming Language Vocabularies from Source Code. In: Proceedings of the 21st conference of the psychology of programming group(PPIG), London"},{"key":"9369_CR8","unstructured":"Lawire D, Binkley D, Morrel C (2010) Normalizaing Source Code Vocabulary. In: Proceedings of the 17th working conference on reverse engineering, Boston, pp 3\u201312"},{"key":"9369_CR9","doi-asserted-by":"crossref","unstructured":"Abebe SL, Tonella P (2010) Natural Language Parsing of Program Element Names for Concept Extraction. In: proceedings of international conference on program comprehension(ICPC), Minho, pp 156\u2013159","DOI":"10.1109\/ICPC.2010.29"},{"key":"9369_CR10","doi-asserted-by":"crossref","unstructured":"Falleri J, Lafourcade M, Nebut C, Prince V, Dao M (2010) Automatic Extraction of a WordNet-like Identifier Network from Software. In: Proceedings of international conference on Program comprehension(ICPC), Minho, pp 4\u201313","DOI":"10.1109\/ICPC.2010.12"},{"key":"9369_CR11","doi-asserted-by":"crossref","unstructured":"Abebe S, Tonella P (2013) Automated identifier completion and replacement. In: Proceedings of the european conference on software maintenance and reengineering (CSMR), Genova, pp 263\u2013272","DOI":"10.1109\/CSMR.2013.35"},{"issue":"1","key":"9369_CR12","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/978-3-642-03013-0_14","volume":"5653","author":"EW Host","year":"2009","unstructured":"Host EW, Ostvold BM (2009) Debugging Method Names, Proceedings of the 23rd European Conference on Object-Oriented Programming. Lect. Notes Comput. Sci 5653(1):294\u2013317","journal-title":"Lect. Notes Comput. Sci"},{"issue":"1","key":"9369_CR13","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-642-35603-2_17","volume":"352","author":"S Lee","year":"2012","unstructured":"Lee S, Kim S, Kim J, Park S (2012) Detecting Inconsistent Names of Source Code Using NLP. Computer Applications for Database, Education, and Ubiquitous Computing Communications in Computer and Information Science 352(1):111\u2013115","journal-title":"Computer Applications for Database, Education, and Ubiquitous Computing Communications in Computer and Information Science"},{"key":"9369_CR14","unstructured":"Code Conventions for the Java Programming Language: Why Have Code Conventions Sun Microsystems (1999). http:\/\/www.oracle.com\/technetwork\/java\/index-135089.html"},{"issue":"4","key":"9369_CR15","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s10664-006-9032-2","volume":"12","author":"D Lawrie","year":"2007","unstructured":"Lawrie D, Feild H, Binkley D (2007) Quantifying identifier quality: an analysis of trends. Empir Softw Eng 12(4):359\u2013388","journal-title":"Empir Softw Eng"},{"key":"9369_CR16","doi-asserted-by":"crossref","unstructured":"Madani N, Guerroju L, Penta MD, Gueheneuc Y, Antoniol G (2010) Recognizing Words from Source Code Identifiers using Speech Recognition Techniques. In: Proceedings of 14th european conference on software maintenance and reengineering(CSMR), Madrid, pp 68\u201377","DOI":"10.1109\/CSMR.2010.31"},{"key":"9369_CR17","unstructured":"Goodliffe P (2006) Code Craft: The Practice of Writing Excellent Code. No Starch Press"},{"key":"9369_CR18","unstructured":"WordNet: A lexical database for English Home page (2014). http:\/\/wordnet.princeton.edu\/"},{"issue":"1","key":"9369_CR19","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1037\/0096-1523.7.3.573","volume":"7","author":"RN Haber","year":"1981","unstructured":"Haber RN, Schindler RM (1981) Errors in proofreading: Evidence of Syntactic Control of Letter Processing. J Exp Psychol Hum Percept Perform 7(1):573\u2013579","journal-title":"J Exp Psychol Hum Percept Perform"},{"issue":"1","key":"9369_CR20","doi-asserted-by":"crossref","first-page":"16","DOI":"10.3758\/BF03197657","volume":"11","author":"AF Monk","year":"1983","unstructured":"Monk AF, Hulme C (1983) Errors in proofreading: Evidence for the Use of Word Shape in Word Recognition. Mem Cogn 11(1):16\u201323","journal-title":"Mem Cogn"},{"key":"9369_CR21","doi-asserted-by":"crossref","unstructured":"Caprile B, Tonella P (1999) Nomen Est Omen: Analyzing the Language of Funtion Identifiers. In: Proceedings of working conference on reverse engineering, Altanta, pp 112\u2013122","DOI":"10.1109\/WCRE.1999.806952"},{"key":"9369_CR22","unstructured":"The Stanford Parser: A statistical parser Home page (2014). http:\/\/nlp.stanford.edu\/software\/lex-parser.shtml"},{"key":"9369_CR23","unstructured":"Apache OpenNLP Homepage (2014). http:\/\/opennlp.apache.org\/"},{"key":"9369_CR24","doi-asserted-by":"crossref","unstructured":"Binkley D, Hearn M, Lawrie D (2011) Improving Identifier Informativeness using Part of Speech Information. In: Proceedings of the 8th working conference on mining software repositories, New York, pp 203\u20132006","DOI":"10.1145\/1985441.1985471"},{"key":"9369_CR25","unstructured":"Guapa S, Malik S, Pollock L, Vijay-Shanker K (2013) Part-of-Speech Tagging of Program Identifiers for Improved Text-Based Software Engineering Tools. In: Proceedings of 21st international conference on program comprehension (ICPC), San Francisco, pp 3\u201312"},{"key":"9369_CR26","unstructured":"MINIPAR Homepage (2014). http:\/\/webdocs.cs.ualberta.ca\/lindek\/minipar.htm"},{"key":"9369_CR27","doi-asserted-by":"crossref","unstructured":"Toutanova K, Klein D, Manning C, Singer Y (2003) Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network. In: Proceedings of HLT-NAACL, pp 252\u2013259","DOI":"10.3115\/1073445.1073478"},{"key":"9369_CR28","unstructured":"The Penn Treebank Project (2013). http:\/\/www.cis.upenn.edu\/treebank\/"},{"issue":"1","key":"9369_CR29","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1162\/coli.2006.32.1.13","volume":"32","author":"A Budanitsky","year":"2006","unstructured":"Budanitsky A, Hirst G (2006) Evaluating WordNet-based Measures of Lexical Semantic Relatedness. Comput Linguis 32(1):13\u201347","journal-title":"Comput Linguis"},{"issue":"8","key":"9369_CR30","first-page":"707","volume":"10","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions and reversals. Sov Phys Doklady 10(8):707\u2013710","journal-title":"Sov Phys Doklady"},{"key":"9369_CR31","volume-title":"Information Retrival : Data Structures and Algorithms","author":"WB Frakes","year":"1992","unstructured":"Frakes WB, Baeza-Yates R (1992) Information Retrival : Data Structures and Algorithms. J.J.: Prentice-Hall, Englewood Cliffs"},{"key":"9369_CR32","unstructured":"Apache Lucene Homegage (2013). http:\/\/lucene.apache.org\/core\/"},{"key":"9369_CR33","unstructured":"Apache Ant Homepage (2013). http:\/\/ant.apache.org\/"},{"key":"9369_CR34","unstructured":"Apache JMeter Homepage (2013). http:\/\/jmeter.apache.org\/"},{"key":"9369_CR35","unstructured":"JUnit Homepage (2013). http:\/\/www.junit.org\/"},{"key":"9369_CR36","unstructured":"JHotDraw 7 Homepage (2013). http:\/\/www.randelshofer.ch\/oop\/jhotdraw\/"},{"key":"9369_CR37","unstructured":"Sweet Home 3D Homepage (2013). http:\/\/sourceforge.net\/projects\/sweethome3d"},{"key":"9369_CR38","doi-asserted-by":"crossref","unstructured":"Klein D, Manning CD (2003) Accurate Unlexicalized Parsing. In: Proceedings of the meeting of the association for computational linguistics, Sapporo, pp 423\u2013430","DOI":"10.3115\/1075096.1075150"},{"key":"9369_CR39","unstructured":"Code Amigo Validation WebPage (2014). http:\/\/54.250.194.210\/"},{"issue":"1","key":"9369_CR40","first-page":"37","volume":"1","author":"DM Powers","year":"2011","unstructured":"Powers DM (2011) Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation. J Mach Learn Technol 1(1):37\u201363","journal-title":"J Mach Learn Technol"},{"key":"9369_CR41","unstructured":"Eclipse-CS Check Style Homepage (2013). http:\/\/eclipse-cs.sourceforge.net\/"},{"key":"9369_CR42","unstructured":"Find Bugs in Java Programs Homepage (2013). http:\/\/findbugs.sourceforge.net\/"},{"key":"9369_CR43","unstructured":"Bloch J (2001) Effective Java Programming Language Guide. Sun Microsystems"},{"key":"9369_CR44","unstructured":"Bolch J (2008) Effective Java (2nd Edition), 2nd edn. Addison-Wesley"},{"key":"9369_CR45","doi-asserted-by":"crossref","unstructured":"Arnaoudova V, Penta MD, Antoniol G, Gueheneuc Y (2013) A New Family of Software Anti-Patterns: Linguistic Anti-Patterns. In: Proceedings of the european conference on software maintenance and reengineering (CSMR), Genova, pp 187\u2013196","DOI":"10.1109\/CSMR.2013.28"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9369-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-015-9369-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9369-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:15:17Z","timestamp":1559236517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-015-9369-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,7]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["9369"],"URL":"https:\/\/doi.org\/10.1007\/s10664-015-9369-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,7]]}}}