{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T22:19:40Z","timestamp":1771539580037,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["407\/13"],"award-info":[{"award-number":["407\/13"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s10664-018-9628-3","type":"journal-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T05:30:26Z","timestamp":1528695026000},"page":"287-328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Syntax, predicates, idioms \u2014 what really affects code complexity?"],"prefix":"10.1007","volume":"24","author":[{"given":"Shulamyt","family":"Ajami","sequence":"first","affiliation":[]},{"given":"Yonatan","family":"Woodbridge","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2733-7709","authenticated-orcid":false,"given":"Dror G.","family":"Feitelson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"issue":"3","key":"9628_CR1","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TSE.2012.27","volume":"39","author":"S Abrah\u00e3o","year":"2013","unstructured":"Abrah\u00e3o S, Gravino C, Insfran E, Scanniello G, Tortora G (2013) Assessing the effectiveness of sequence diagrams in the comprehension of functional requirements: results from a family of five experiments. IEEE Trans Softw Eng 39 (3):327\u2013342. \n                    https:\/\/doi.org\/10.1109\/TSE.2012.27","journal-title":"IEEE Trans Softw Eng"},{"issue":"11","key":"9628_CR2","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/TSE.1985.231883","volume":"SE-11","author":"B Adelson","year":"1985","unstructured":"Adelson B, Soloway E (1985) The role of domain experience in software design. IEEE Trans Softw Eng SE-11(11):1351\u20131360. \n                    https:\/\/doi.org\/10.1109\/TSE.1985.231883","journal-title":"IEEE Trans Softw Eng"},{"key":"9628_CR3","volume-title":"Categorical data analysis","author":"A Agresti","year":"2011","unstructured":"Agresti A, Kateri M (2011) Categorical data analysis. Springer, Berlin"},{"key":"9628_CR4","doi-asserted-by":"publisher","unstructured":"Ajami S, Woodbridge Y, Feitelson DG (2017) Syntax, predicates, idioms \u2014 what really affects code complexity? In: 25th international conference of program comprehension, pp 66\u201376. \n                    https:\/\/doi.org\/10.1109\/ICPC.2017.39","DOI":"10.1109\/ICPC.2017.39"},{"key":"9628_CR5","doi-asserted-by":"publisher","unstructured":"Ali M, Elish MO (2013) A comparative literature survey of design patterns impact on software quality. In: International conference of information science & applications. \n                    https:\/\/doi.org\/10.1109\/ICISA.2013.6579460","DOI":"10.1109\/ICISA.2013.6579460"},{"issue":"3","key":"9628_CR6","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/0164-1212(95)00074-7","volume":"34","author":"V Arunachalam","year":"1996","unstructured":"Arunachalam V, Sasso W (1996) Cognitive processes in program comprehension: an empirical analysis in the context of software reengineering. J Syst Softw 34 (3):177\u2013189. \n                    https:\/\/doi.org\/10.1016\/0164-1212(95)00074-7","journal-title":"J Syst Softw"},{"key":"9628_CR7","doi-asserted-by":"publisher","unstructured":"Avidan E, Feitelson DG (2017) Effects of variable names on comprehension: an empirical study. In: 25th international conference in program comprehension, pp 55\u201365. \n                    https:\/\/doi.org\/10.1109\/ICPC.2017.27","DOI":"10.1109\/ICPC.2017.27"},{"issue":"7","key":"9628_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/2.869371","volume":"33","author":"T Ball","year":"2000","unstructured":"Ball T, Larus JR (2000) Using paths to measure, explain, and enhance program behavior. Computer 33(7):57\u201365. \n                    https:\/\/doi.org\/10.1109\/2.869371","journal-title":"Computer"},{"key":"9628_CR9","doi-asserted-by":"publisher","unstructured":"Bednarik R, Tukiainen M (2006) An eye-tracking methodology for characterizing porgram comprehension processes. In: 4th symposium eye tracking research & applications, pp 125\u2013132. \n                    https:\/\/doi.org\/10.1145\/1117309.1117356","DOI":"10.1145\/1117309.1117356"},{"issue":"4","key":"9628_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1027\/1614-0001\/a000052","volume":"32","author":"GR Bergersen","year":"2011","unstructured":"Bergersen GR, Gustafsson J-E (2011) Programming skill, knowledge, and working memory among professional software developers from an investment theory perspective. J Individ Differ 32(4):201\u2013209. \n                    https:\/\/doi.org\/10.1027\/1614-0001\/a000052","journal-title":"J Individ Differ"},{"issue":"12","key":"9628_CR11","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1109\/TSE.2014.2348997","volume":"40","author":"GR Bergersen","year":"2014","unstructured":"Bergersen GR, Sj\u00f8berg DIK, Dyb\u00e5 T (2014) Construction and validation of an instrument for measuring programming skill. IEEE Trans Softw Eng 40(12):1163\u20131184. \n                    https:\/\/doi.org\/10.1109\/TSE.2014.2348997","journal-title":"IEEE Trans Softw Eng"},{"key":"9628_CR12","doi-asserted-by":"publisher","unstructured":"Bishop B, McDaid K (2008) Spreadsheet debugging behaviour of expert and novice end-users. In: 4th international workshop end-user software engineering, pp 56\u201360. \n                    https:\/\/doi.org\/10.1145\/1370847.1370860","DOI":"10.1145\/1370847.1370860"},{"key":"9628_CR13","doi-asserted-by":"publisher","unstructured":"Bishop J, Horspool RN, Xie T, Tillmann N, de Halleux J (2015) Code hunt: experience with coding contests at scale. In 37th international conference and software engineering, vol 2, pp 398\u2013407. \n                    https:\/\/doi.org\/10.1109\/ICSE.2015.172","DOI":"10.1109\/ICSE.2015.172"},{"issue":"6","key":"9628_CR14","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","volume":"18","author":"R Brooks","year":"1983","unstructured":"Brooks R (1983) Towards a theory of the comprehension of computer programs. Intl J Man-Mach Stud 18(6):543\u2013554. \n                    https:\/\/doi.org\/10.1016\/S0020-7373(83)80031-5","journal-title":"Intl J Man-Mach Stud"},{"issue":"4","key":"9628_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MC.1987.1663532","volume":"20","author":"FP Brooks Jr","year":"1987","unstructured":"Brooks Jr, FP (1987) No silver bullet: essence and accidents of software engineering. Computer 20(4):10\u201319. \n                    https:\/\/doi.org\/10.1109\/MC.1987.1663532","journal-title":"Computer"},{"key":"9628_CR16","doi-asserted-by":"publisher","unstructured":"Buse RPL, Weimer WR (2008) A metric for software readability. In: International symposium software testing & analysis, pp 121\u2013130. \n                    https:\/\/doi.org\/10.1145\/1390630.1390647","DOI":"10.1145\/1390630.1390647"},{"key":"9628_CR17","doi-asserted-by":"publisher","unstructured":"Butler S, Wermelinger M, Yu Y, Sharp H (2010) Exploring the influence of identifier names on code quality: An empirical study. In: 14th European conference in software maintenance & reengineering. \n                    https:\/\/doi.org\/10.1109\/CSMR.2010.27","DOI":"10.1109\/CSMR.2010.27"},{"key":"9628_CR18","unstructured":"Coe R (2002) It\u2019s the effect size, stupid: what effect size is and why it is important. In: Conference in British educational research association"},{"issue":"7","key":"9628_CR19","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/PROC.1981.12088","volume":"69","author":"B Curtis","year":"1981","unstructured":"Curtis B (1981) Substantiating programmer variability. Proc IEEE 69(7):846. \n                    https:\/\/doi.org\/10.1109\/PROC.1981.12088","journal-title":"Proc IEEE"},{"key":"9628_CR20","unstructured":"Curtis B, Sheppard SB, Milliman P (1979) Third time charm: stronger prediction of programmer performance by software complexity metrics. In: 4th international conference software and engineering"},{"key":"9628_CR21","doi-asserted-by":"publisher","unstructured":"Curtis B, Sappidi J, Subramanyam J (2011) An evaluation of the internal quality of business applications: does size matter? In: 33rd international conference software and engineering, pp 711\u2013715. \n                    https:\/\/doi.org\/10.1145\/1985793.1985893","DOI":"10.1145\/1985793.1985893"},{"key":"9628_CR22","doi-asserted-by":"publisher","unstructured":"Denaro G, Pezz\u00e8 M (2002) An empirical evaluation of fault-proneness models. In: 24th international conference software and engineering, pp 241\u2013251. \n                    https:\/\/doi.org\/10.1145\/581339.581371","DOI":"10.1145\/581339.581371"},{"key":"9628_CR23","doi-asserted-by":"publisher","unstructured":"Deterding S, Dixon D, Khaled R, Nacke L (2011) From game design elements to gamefulness: Defining \u201cgamification\u201d. In: 15th international academic MindTrek conference: envisioning future media environments, pp 9\u201315. \n                    https:\/\/doi.org\/10.1145\/2181037.2181040","DOI":"10.1145\/2181037.2181040"},{"issue":"3","key":"9628_CR24","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/362929.362947","volume":"11","author":"EW Dijkstra","year":"1968","unstructured":"Dijkstra EW (1968) Go To statement considered harmful. Comm ACM 11(3):147\u2013148. \n                    https:\/\/doi.org\/10.1145\/362929.362947","journal-title":"Comm ACM"},{"key":"9628_CR25","doi-asserted-by":"publisher","unstructured":"Feigenspan J, Apel S, Liebig J, K\u00e4stner C (2011) Exploring software measures to assess program comprehension. In: International symposium empirical software engineering & measurement, pp 127\u2013136. \n                    https:\/\/doi.org\/10.1109\/ESEM.2011.21","DOI":"10.1109\/ESEM.2011.21"},{"key":"9628_CR26","unstructured":"Feitelson DG (2015) Using students as experimental subjects in software engineering research \u2013 a review and discussion of the evidence. arXiv:\n                    http:\/\/arXiv.org\/abs\/1512.08409\n                    \n                   [cs.SE]"},{"key":"9628_CR27","volume-title":"Design patterns: elements of reusable object-oriented software","author":"E Gamma","year":"1994","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1994) Design patterns: elements of reusable object-oriented software. Addison-Wesley, Boston"},{"issue":"5","key":"9628_CR28","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s10664-017-9513-5","volume":"22","author":"Y Gil","year":"2017","unstructured":"Gil Y, Lalouche G (2017) On the correlation between size and metric validity. Empir Softw Eng 22(5):2585\u20132611. \n                    https:\/\/doi.org\/10.1007\/s10664-017-9513-5","journal-title":"Empir Softw Eng"},{"issue":"12","key":"9628_CR29","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/32.106988","volume":"17","author":"GK Gill","year":"1991","unstructured":"Gill GK, Kemerer CF (1991) Cyclomatic complexity density and software maintenance productivity. IEEE Trans Softw Eng 17(12):1284\u20131288. \n                    https:\/\/doi.org\/10.1109\/32.106988","journal-title":"IEEE Trans Softw Eng"},{"key":"9628_CR30","doi-asserted-by":"publisher","unstructured":"Gram\u00df D, Frank T, Rehberger S, Vogel-Heuser B (2014) Female characteristics and requirements in software engineering in mechanical engineering. In: International conference in interactive collaborative learning, pp 272\u2013279. \n                    https:\/\/doi.org\/10.1109\/ICL.2014.7017783","DOI":"10.1109\/ICL.2014.7017783"},{"key":"9628_CR31","doi-asserted-by":"publisher","unstructured":"Gruhn V, Laue R (2007) On experiments for measuring cognitive weights for software control structures. In: 6th international conference in cognitive informatics, pp 116\u2013119. \n                    https:\/\/doi.org\/10.1109\/COGINF.2007.4341880","DOI":"10.1109\/COGINF.2007.4341880"},{"key":"9628_CR32","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.chb.2015.07.045","volume":"54","author":"J Hamari","year":"2016","unstructured":"Hamari J, Shernoff DJ, Rowe E, Coller B, Asbell-Clarke J, Edwards T (2016) Challenging games help students learn: an empirical study on engagement, flow and immersion in game-based learning. Comput Human Behav 54:170\u2013179. \n                    https:\/\/doi.org\/10.1016\/j.chb.2015.07.045","journal-title":"Comput Human Behav"},{"key":"9628_CR33","unstructured":"Hansen M, Goldstone RL, Lumsdaine A (2013) What makes code hard to understand? arXiv:\n                    1304.5257v2\n                    \n                  [cs.SE]"},{"issue":"2","key":"9628_CR34","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3758\/BF03212979","volume":"7","author":"A Heathcote","year":"2000","unstructured":"Heathcote A, Brown S, Mewhort DJK (2000) The power law repealed: the case for an exponential law of practice. Psychon Bullet Rev 7 (2):185\u2013207. \n                    https:\/\/doi.org\/10.3758\/BF03212979","journal-title":"Psychon Bullet Rev"},{"issue":"5","key":"9628_CR35","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TSE.1981.231113","volume":"SE-7","author":"S Henry","year":"1981","unstructured":"Henry S, Kafura D (1981) Software structure metrics based on information flow. IEEE Trans Softw Eng SE-7(5):510\u2013518. \n                    https:\/\/doi.org\/10.1109\/TSE.1981.231113","journal-title":"IEEE Trans Softw Eng"},{"key":"9628_CR36","unstructured":"Herraiz I, Hassan AE (2011) Beyond lines of code: do we need more complexity metrics?. In: Oram A, Wilson G (eds) Making software: what really works, and why we believe it. O\u2019Reilly Media Inc., pp 125\u2013141"},{"key":"9628_CR37","doi-asserted-by":"publisher","unstructured":"Huotari K, Hamari J (2012) Defining gamification: a service marketing perspective. In: 16th international academic MindTrek conference, pp 17\u201322. \n                    https:\/\/doi.org\/10.1145\/2393132.2393137","DOI":"10.1145\/2393132.2393137"},{"issue":"1","key":"9628_CR38","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0020-7373(88)80052-X","volume":"28","author":"ER Iselin","year":"1988","unstructured":"Iselin ER (1988) Conditional statements, looping constructs, and program comprehension: an experimental study. Intl J Man-Mach Stud 28(1):45\u201366. \n                    https:\/\/doi.org\/10.1016\/S0020-7373(88)80052-X","journal-title":"Intl J Man-Mach Stud"},{"key":"9628_CR39","doi-asserted-by":"publisher","unstructured":"Jbara A, Feitelson DG (2014) On the effect of code regularity on comprehension. In: 22nd international conference in program comprehension, pp 189\u2013200. \n                    https:\/\/doi.org\/10.1145\/2597008.2597140","DOI":"10.1145\/2597008.2597140"},{"issue":"3","key":"9628_CR40","doi-asserted-by":"publisher","first-page":"1440","DOI":"10.1007\/s10664-016-9477-x","volume":"22","author":"A Jbara","year":"2017","unstructured":"Jbara A, Feitelson DG (2017) How programmers read regular code: a controlled experiment using eye tracking. Empir Softw Eng 22(3):1440\u20131477. \n                    https:\/\/doi.org\/10.1007\/s10664-016-9477-x","journal-title":"Empir Softw Eng"},{"key":"9628_CR41","doi-asserted-by":"publisher","unstructured":"Kahney H (1983) What do novice programmers know about recursion. In: SIGCHI conference human factors in computer system, pp 235\u2013239. \n                    https:\/\/doi.org\/10.1145\/800045.801618","DOI":"10.1145\/800045.801618"},{"key":"9628_CR42","doi-asserted-by":"publisher","unstructured":"Katzmarski B, Koschke R (2012) Program complexity metrics and programmer opinions. In: 20th international conferenc in program comprehension, pp 17\u201326. \n                    https:\/\/doi.org\/10.1109\/ICPC.2012.6240486","DOI":"10.1109\/ICPC.2012.6240486"},{"issue":"5","key":"9628_CR43","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/2898967","volume":"59","author":"K Kirkpatrick","year":"2016","unstructured":"Kirkpatrick K (2016) Coding as sport. Comm ACM 59(5):32\u201333. \n                    https:\/\/doi.org\/10.1145\/289867","journal-title":"Comm ACM"},{"issue":"5","key":"9628_CR44","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/S0020-7373(84)80021-8","volume":"20","author":"M Klerer","year":"1984","unstructured":"Klerer M (1984) Experimental study of a two-dimensional language vs Fortran for first-course programmers. Intl J Man-Mach Stud 20(5):445\u2013467. \n                    https:\/\/doi.org\/10.1016\/S0020-7373(84)80021-8","journal-title":"Intl J Man-Mach Stud"},{"key":"9628_CR45","doi-asserted-by":"crossref","unstructured":"Landman D, Serebrenik A, Vinju J (2014) Empirical analysis of the relationship between CC and SLOC in a large corpus of Java methods. In: International conference software maintenance & evolution","DOI":"10.1109\/ICSME.2014.44"},{"issue":"4","key":"9628_CR46","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/0164-1212(87)90032-X","volume":"7","author":"S Letovsky","year":"1987","unstructured":"Letovsky S (1987) Cognitive processes in program comprehension. J Syst Softw 7(4):325\u2013339. \n                    https:\/\/doi.org\/10.1016\/0164-1212(87)90032-X","journal-title":"J Syst Softw"},{"issue":"1","key":"9628_CR47","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1146\/annurev.publhealth.23.100901.140546","volume":"23","author":"T Lumley","year":"2002","unstructured":"Lumley T, Diehr P, Emerson S, Chen L (2002) The importance of the normality assumption in large public health data sets. Ann Rev of Publ Health 23 (1):151\u2013169","journal-title":"Ann Rev of Publ Health"},{"key":"9628_CR48","doi-asserted-by":"publisher","unstructured":"Mair P, Hatzinger R (2007) Extended Rasch modeling: the eRm package for the application of IRT models in R. J Stat Softw 20(9). \n                    https:\/\/doi.org\/10.18637\/jss.v020.i09","DOI":"10.18637\/jss.v020.i09"},{"issue":"4","key":"9628_CR49","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"SE-2","author":"T McCabe","year":"1976","unstructured":"McCabe T (1976) A complexity measure. IEEE Trans Softw Eng SE-2(4):308\u2013320. \n                    https:\/\/doi.org\/10.1109\/TSE.1976.233837","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9628_CR50","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/0164-1212(90)90051-M","volume":"12","author":"JC Munson","year":"1990","unstructured":"Munson JC, Khoshgoftaar TM (1990) Applications of a relative complexity metric for software project management. J Syst Softw 12 (3):283\u2013291. \n                    https:\/\/doi.org\/10.1016\/0164-1212(90)90051-M","journal-title":"J Syst Softw"},{"issue":"10","key":"9628_CR51","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/954627.954633","volume":"12","author":"GJ Myers","year":"1977","unstructured":"Myers GJ (1977) An extension to the cyclomatic measure of program complexity. SIGPLAN Not 12(10):61\u201364. \n                    https:\/\/doi.org\/10.1145\/954627.954633","journal-title":"SIGPLAN Not"},{"key":"9628_CR52","doi-asserted-by":"publisher","DOI":"10.1002\/9780470556986","volume-title":"Generalized linear models: with applications in engineering and the sciences","author":"RH Myers","year":"2010","unstructured":"Myers RH, Montgomery DC, Vining GG, Robinson TJ (2010) Generalized linear models: with applications in engineering and the sciences. Wiley, Hoboken"},{"issue":"2","key":"9628_CR53","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/S0020-7373(84)80060-7","volume":"21","author":"BT Mynatt","year":"1984","unstructured":"Mynatt BT (1984) The effect of semantic complexity on the comprehension of program modules. Intl J Man-Mach Stud 21(2):91\u2013103. \n                    https:\/\/doi.org\/10.1016\/S0020-7373(84)80060-7","journal-title":"Intl J Man-Mach Stud"},{"key":"9628_CR54","unstructured":"Newell A, Rosenbloom PS (1981) Mechanisms of skill acquisition and the law of practice. In: Anderson JR (ed) Cognitive skills and their acquisition. Lawrence Erlbaum Association, pp 1\u201355"},{"key":"9628_CR55","doi-asserted-by":"publisher","unstructured":"Nunez WZ, Marin VJ, Rivero CR (2017) ARCC: Assistant For repetitive code comprehension. In: 11th joint European software engineering conference & symposium foundations of software engineering, pp 999\u20131003. \n                    https:\/\/doi.org\/10.1145\/3106237.3122824","DOI":"10.1145\/3106237.3122824"},{"issue":"12","key":"9628_CR56","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/32.553637","volume":"22","author":"N Ohlsson","year":"1996","unstructured":"Ohlsson N, Alberg H (1996) Predicting fault-prone software modules in telephone switches. IEEE Trans Softw Eng 22(12):886\u2013894. \n                    https:\/\/doi.org\/10.1109\/32.553637","journal-title":"IEEE Trans Softw Eng"},{"key":"9628_CR57","unstructured":"Parnin C, Siegmund J, Peitek N (2017) On the nature of programmer expertise. In: 28th psychology of programming interest group annals workshop"},{"key":"9628_CR58","unstructured":"Pink DH (2009) Drive: The surprising truth about what motivates us. Tiverhead Hardcover"},{"issue":"9","key":"9628_CR59","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/947955.947960","volume":"17","author":"P Piwowarski","year":"1982","unstructured":"Piwowarski P (1982) A nesting level complexity measure. SIGPLAN Not 17 (9):44\u201350. \n                    https:\/\/doi.org\/10.1145\/947955.947960","journal-title":"SIGPLAN Not"},{"issue":"10","key":"9628_CR60","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/317665.317683","volume":"42","author":"L Prechelt","year":"1999","unstructured":"Prechelt L (1999) Comparing Java vs. C\/C++ efficiency differences to interpersonal differences. Comm ACM 42(10):109\u2013112. \n                    https:\/\/doi.org\/10.1145\/317665.317683","journal-title":"Comm ACM"},{"key":"9628_CR61","doi-asserted-by":"publisher","unstructured":"Rajlich V, Cowan GS (1997) Towards standard for experiments in program comprehension. In: 5th IEEE international workshop program comprehension, pp 160\u2013161. \n                    https:\/\/doi.org\/10.1109\/WPC.1997.601284","DOI":"10.1109\/WPC.1997.601284"},{"key":"9628_CR62","unstructured":"Rich C (1987) Inspection methods in programming: Clich\u00e9s and plans. A.I. Memo 1005, MIT Artificial Intelligence Laboratory"},{"key":"9628_CR63","doi-asserted-by":"crossref","unstructured":"Rilling J, Klemola T (2003) Identifying comprehension bottlenecks using program slicing and cognitive complexity metrics. In: 11th IEEE international workshop program comprehension, pp 115\u2013124","DOI":"10.1109\/WPC.2003.1199195"},{"issue":"1","key":"9628_CR64","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/362851.362858","volume":"11","author":"H Sackman","year":"1968","unstructured":"Sackman H, Erikson WJ, Grant EE (1968) Exploratory experimental studies comparing online and offline programming performance. Comm ACM 11(1):3\u201311. \n                    https:\/\/doi.org\/10.1145\/362851.362858","journal-title":"Comm ACM"},{"key":"9628_CR65","doi-asserted-by":"publisher","unstructured":"Schneidewind N, Hinchey M (2009) A complexity reliability model. In: 20th international symposium software reliability engineering, pp 1\u201310. \n                    https:\/\/doi.org\/10.1109\/ISSRE.2009.10","DOI":"10.1109\/ISSRE.2009.10"},{"issue":"2","key":"9628_CR66","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/CJECE.2003.1532511","volume":"28","author":"J Shao","year":"2003","unstructured":"Shao J, Wang Y (2003) A new measure of software complexity based on cognitive weights. Canadian. J Elect Comput Eng 28(2):69\u201374. \n                    https:\/\/doi.org\/10.1109\/CJECE.2003.1532511","journal-title":"J Elect Comput Eng"},{"key":"9628_CR67","doi-asserted-by":"publisher","unstructured":"Sharafi Z, Soh Z, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) Women and men \u2014 different but equal: on the impact of identifier style on source code reading. In: 20th international conferenc program comprehension, pp 27\u201336. \n                    https:\/\/doi.org\/10.1109\/ICPC.2012.6240505","DOI":"10.1109\/ICPC.2012.6240505"},{"issue":"2","key":"9628_CR68","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1049\/sej.1988.0003","volume":"3","author":"M Shepperd","year":"1988","unstructured":"Shepperd M (1988) A critique of cyclomatic complexity as a software metric. Softw Eng J 3(2):30\u201336. \n                    https:\/\/doi.org\/10.1049\/sej.1988.0003","journal-title":"Softw Eng J"},{"issue":"3","key":"9628_CR69","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BF00977789","volume":"8","author":"B Shneiderman","year":"1979","unstructured":"Shneiderman B, Mayer R (1979) Syntactic\/semantic interactions in programmer behavior: a model and experimental results. Intl J Comput Inf Syst 8(3):219\u2013238. \n                    https:\/\/doi.org\/10.1007\/BF00977789","journal-title":"Intl J Comput Inf Syst"},{"issue":"5","key":"9628_CR70","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/s10664-013-9286-4","volume":"19","author":"J Siegmund","year":"2014","unstructured":"Siegmund J, K\u00e4stner C, Liebig J, Apel S, Hanenberg S (2014) Measuring and modeling programming experience. Empir Softw Eng 19(5):1299\u20131334. \n                    https:\/\/doi.org\/10.1007\/s10664-013-9286-4","journal-title":"Empir Softw Eng"},{"issue":"4","key":"9628_CR71","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s10664-014-9318-8","volume":"20","author":"J Siegmund","year":"2015","unstructured":"Siegmund J, Schumann J (2015) Confounding parameters on program comprehension: a literature survey. Empir Softw Eng 20(4):1159\u20131192. \n                    https:\/\/doi.org\/10.1007\/s10664-014-9318-8","journal-title":"Empir Softw Eng"},{"issue":"5","key":"9628_CR72","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1109\/TSE.1984.5010283","volume":"SE-10","author":"E Soloway","year":"1984","unstructured":"Soloway E, Ehrlich K (1984) Empirical studies of programming knowledge. IEEE Trans Softw Eng SE-10(5):595\u2013609. \n                    https:\/\/doi.org\/10.1109\/TSE.1984.5010283","journal-title":"IEEE Trans Softw Eng"},{"issue":"5","key":"9628_CR73","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1037\/0021-9010.83.5.703","volume":"83","author":"S Sonnentag","year":"1998","unstructured":"Sonnentag S (1998) Expertise in professional software design: a process study. J App Psychol 83(5):703\u2013715. \n                    https:\/\/doi.org\/10.1037\/0021-9010.83.5.703","journal-title":"J App Psychol"},{"key":"9628_CR74","doi-asserted-by":"crossref","unstructured":"Sonnentag S, Niessen C, Volmer J (2006) Expertise in software design. In: Ericsson KA, Charness N, Feltovich PJ, Hoffman RR (eds) The Cambridge handbook of expertise and expert performance. Cambridge University Press, pp 373\u2013387","DOI":"10.1017\/CBO9780511816796.021"},{"key":"9628_CR75","doi-asserted-by":"crossref","unstructured":"Vinju JJ, Godfrey MW (2012) What does control flow really look like? Eyeballing the cyclomatic complexity metric. In: 12th IEEE international working conference source code analysis & manipulation","DOI":"10.1109\/SCAM.2012.17"},{"issue":"8","key":"9628_CR76","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/2.402076","volume":"28","author":"A von Mayrhauser","year":"1995","unstructured":"von Mayrhauser A, Vans AM (1995) Program comprehension during software maintenance and evolution. Computer 28(8):44\u201355. \n                    https:\/\/doi.org\/10.1109\/2.402076","journal-title":"Computer"},{"issue":"3\/4","key":"9628_CR77","doi-asserted-by":"publisher","first-page":"350","DOI":"10.2307\/2332010","volume":"29","author":"BL Welch","year":"1938","unstructured":"Welch BL (1938) The significance of the difference between two means when the population variances are unequal. Biometrika 29(3\/4):350\u2013362","journal-title":"Biometrika"},{"issue":"9","key":"9628_CR78","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/32.6178","volume":"14","author":"EJ Weyuker","year":"1988","unstructured":"Weyuker EJ (1988) Evaluating software complexity measures. IEEE Trans Softw Eng 14(9):1357\u20131365. \n                    https:\/\/doi.org\/10.1109\/32.6178\n                    \n                  ,","journal-title":"IEEE Trans Softw Eng"},{"key":"9628_CR79","doi-asserted-by":"publisher","unstructured":"Yoder KJ, Belmonte MK (2010) Combining computer game-based behavioral experiments with high-density EEG and infrared gaze tracking. J Vis Exp 46, art. no. e2320. \n                    https:\/\/doi.org\/10.3791\/2320","DOI":"10.3791\/2320"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9628-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9628-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9628-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T11:22:01Z","timestamp":1576840921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9628-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":79,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["9628"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9628-3","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,11]]},"assertion":[{"value":"11 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}