{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T02:27:27Z","timestamp":1768616847703,"version":"3.49.0"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100021856","name":"Ministero dell\u2019Universit\u00e1 e della Ricerca","doi-asserted-by":"publisher","award":["PRIN 2020 EMELIOT - 2020W3A5FY"],"award-info":[{"award-number":["PRIN 2020 EMELIOT - 2020W3A5FY"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10664-024-10568-z","type":"journal-article","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T09:03:30Z","timestamp":1729587810000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The downside of functional constructs: a quantitative and qualitative analysis of their fix-inducing effects"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7098-8964","authenticated-orcid":false,"given":"Fiorella","family":"Zampetti","sequence":"first","affiliation":[]},{"given":"Cyrine","family":"Zid","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]},{"given":"Massimiliano Di","family":"Penta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,22]]},"reference":[{"key":"10568_CR1","doi-asserted-by":"publisher","unstructured":"Ajami S, Woodbridge Y, Feitelson DG (2017) Syntax, predicates, idioms - what really affects code complexity? In: 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), pp 66\u201376. https:\/\/doi.org\/10.1109\/ICPC.2017.39","DOI":"10.1109\/ICPC.2017.39"},{"key":"10568_CR2","doi-asserted-by":"crossref","unstructured":"Alexandru CV, Merchante JJ, Panichella S, Proksch S, Gall HC, Robles G (2018) On the usage of pythonic idioms. In: Onward!. ACM, pp 1\u201311","DOI":"10.1145\/3276954.3276960"},{"key":"10568_CR3","doi-asserted-by":"crossref","unstructured":"Antoniol G, Ayari K, Di Penta M, Khomh F, Gu\u00e9h\u00e9neuc YG (2008) Is it a bug or an enhancement?: a text-based approach to classify change requests. In: Proceedings of the 2008 conference of the centre for advanced studies on collaborative research. IBM, p\u00a023","DOI":"10.1145\/1463788.1463819"},{"key":"10568_CR4","doi-asserted-by":"publisher","unstructured":"Anvik J, Murphy GC (2007) Determining implementation expertise from bug reports. In: Fourth international workshop on mining software repositories, MSR 2007 (ICSE Workshop), Minneapolis, MN, USA, May 19-20, 2007, Proceedings. IEEE Computer Society, p\u00a02. https:\/\/doi.org\/10.1109\/MSR.2007.7","DOI":"10.1109\/MSR.2007.7"},{"issue":"1","key":"10568_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v067.i01","volume":"67","author":"D Bates","year":"2015","unstructured":"Bates D, M\u00e4chler M, Bolker B, Walker S (2015) Fitting linear mixed-effects models using lme4. J Stat Softw 67(1):1\u201348","journal-title":"J Stat Softw"},{"key":"10568_CR6","doi-asserted-by":"crossref","unstructured":"Bavota G, Carluccio BD, De Lucia A, Di Penta M, Oliveto R, Strollo O (2012a) When does a refactoring induce bugs? an empirical study. In: Proceedings of the IEEE international working conference on source code analysis and manipulation, pp 104\u2013113","DOI":"10.1109\/SCAM.2012.20"},{"key":"10568_CR7","doi-asserted-by":"crossref","unstructured":"Bavota G, Carluccio BD, De Lucia A, Di Penta M, Oliveto R, Strollo O (2012b) When does a refactoring induce bugs? an empirical study. In: 12th IEEE International working conference on source code analysis and manipulation, SCAM 2012, Riva del Garda, Italy, September 23-24, 2012, pp 104\u2013113","DOI":"10.1109\/SCAM.2012.20"},{"issue":"1","key":"10568_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","volume":"57","author":"Y Benjamini","year":"1995","unstructured":"Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing. J Roy Stat Soc: Ser B (Methodol) 57(1):289\u2013300","journal-title":"J Roy Stat Soc: Ser B (Methodol)"},{"issue":"4","key":"10568_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3340571","volume":"41","author":"ED Berger","year":"2019","unstructured":"Berger ED, Hollenbeck C, Maj P, Vitek O, Vitek J (2019) On the impact of programming languages on code quality: a reproduction study. ACM Transactions on Programming Languages and Systems (TOPLAS) 41(4):1\u201324","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"key":"10568_CR10","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.jss.2018.02.065","volume":"140","author":"ML Bernardi","year":"2018","unstructured":"Bernardi ML, Canfora G, Di Lucca GA, Di Penta M, Distante D (2018) The relation between developers\u2019 communication and fix-inducing changes: an empirical study. J Syst Softw 140:111\u2013125. https:\/\/doi.org\/10.1016\/j.jss.2018.02.065","journal-title":"J Syst Softw"},{"key":"10568_CR11","doi-asserted-by":"crossref","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu PT (2009) Fair and balanced?: bias in bug-fix datasets. In: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT international symposium on foundations of software engineering, 2009, Amsterdam, The Netherlands, August 24-28, 2009, pp 121\u2013130","DOI":"10.1145\/1595696.1595716"},{"key":"10568_CR12","doi-asserted-by":"publisher","unstructured":"Bogachenkova V, Nguyen L, Ebert F, Serebrenik A, Castor F (2022) Evaluating atoms of confusion in the context of code reviews. In: 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp 404\u2013408. https:\/\/doi.org\/10.1109\/ICSME55016.2022.00048","DOI":"10.1109\/ICSME55016.2022.00048"},{"key":"10568_CR13","doi-asserted-by":"publisher","unstructured":"Canfora G, Ceccarelli M, Cerulo L, Di Penta M (2011) How long does a bug survive? an empirical study. In: 18th Working conference on reverse engineering, WCRE 2011, Limerick, Ireland, October 17-20, 2011, pp 191\u2013200. https:\/\/doi.org\/10.1109\/WCRE.2011.31","DOI":"10.1109\/WCRE.2011.31"},{"key":"10568_CR14","doi-asserted-by":"crossref","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Meas","DOI":"10.1177\/001316446002000104"},{"issue":"4","key":"10568_CR15","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10664-023-10311-0","volume":"28","author":"JAS da Costa","year":"2023","unstructured":"da Costa JAS, Gheyi R, Castor F, de Oliveira PRF, Ribeiro M, Fonseca B (2023) Seeing confusion through a new lens: on the impact of atoms of confusion on novices\u2019 code comprehension. Empir Softw Eng 28(4):81","journal-title":"Empir Softw Eng"},{"issue":"4\u20135","key":"10568_CR16","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10664-011-9173-9","volume":"17","author":"M D\u2019Ambros","year":"2012","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2012) Evaluating defect prediction approaches: a benchmark and an extensive comparison. Empir Softw Eng 17(4\u20135):531\u2013577","journal-title":"Empir Softw Eng"},{"key":"10568_CR17","doi-asserted-by":"crossref","unstructured":"de Oliveira B, Ribeiro M, da Costa JAS, Gheyi R, Amaral G, de Mello RM, Oliveira A, Garcia AF, Bonif\u00e1cio R, Fonseca B (2020) Atoms of confusion: the eyes do not lie. In: 34th Brazilian symposium on software engineering, SBES 2020, Natal, Brazil, October 19-23, 2020. ACM, pp 243\u2013252","DOI":"10.1145\/3422392.3422437"},{"key":"10568_CR18","doi-asserted-by":"publisher","unstructured":"Di Penta M, Bavota G, Zampetti F (2020) On the relationship between refactoring actions and bugs: a differentiated replication. In: ESEC\/FSE \u201920: 28th ACM Joint European software engineering conference and symposium on the foundations of software engineering, Virtual Event, USA, November 8-13, 2020, pp 556\u2013567. https:\/\/doi.org\/10.1145\/3368089.3409695","DOI":"10.1145\/3368089.3409695"},{"issue":"7","key":"10568_CR19","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TSE.2003.1214329","volume":"29","author":"J Dolado","year":"2003","unstructured":"Dolado J, Harman M, Otero M, Hu L (2003) An empirical investigation of the influence of a type of side effects on program comprehension. IEEE Trans Software Eng 29(7):665\u2013670. https:\/\/doi.org\/10.1109\/TSE.2003.1214329","journal-title":"IEEE Trans Software Eng"},{"key":"10568_CR20","unstructured":"Falleri J, Ham H (2022) Gumtree pythonparser module https:\/\/github.com\/GumTreeDiff\/pythonparser (last access: 03\/10\/2022)"},{"key":"10568_CR21","doi-asserted-by":"publisher","unstructured":"Falleri J, Morandat F, Blanc X, Martinez M, Monperrus M (2014) Fine-grained and accurate source code differencing. In: ACM\/IEEE International conference on automated software engineering, ASE \u201914, Vasteras, Sweden - September 15 - 19, 2014, pp 313\u2013324. https:\/\/doi.org\/10.1145\/2642937.2642982","DOI":"10.1145\/2642937.2642982"},{"key":"10568_CR22","doi-asserted-by":"publisher","unstructured":"Ferzund J, Ahsan SN, Wotawa F (2009) Bug-inducing language constructs. In: 16th Working conference on reverse engineering, WCRE 2009, 13-16 October 2009, Lille, France, pp 155\u2013159. https:\/\/doi.org\/10.1109\/WCRE.2009.40","DOI":"10.1109\/WCRE.2009.40"},{"issue":"1","key":"10568_CR23","doi-asserted-by":"publisher","first-page":"87","DOI":"10.2307\/2340521","volume":"85","author":"RA Fisher","year":"1922","unstructured":"Fisher RA (1922) On the interpretation of chi-square from contingency tables, and the calculation of p. J Roy Stat Soc 85(1):87\u201394","journal-title":"J Roy Stat Soc"},{"key":"10568_CR24","doi-asserted-by":"crossref","unstructured":"Franklin L, Gyori A, Lahoda J, Dig D (2013) LAMBDAFICATOR: from imperative to functional programming through automated refactoring. In: Notkin D, Cheng BHC, Pohl K (eds) 35th International conference on software engineering, ICSE \u201913, San Francisco, CA, USA, May 18-26, 2013. IEEE Computer Society, pp 1287\u20131290","DOI":"10.1109\/ICSE.2013.6606699"},{"key":"10568_CR25","doi-asserted-by":"crossref","unstructured":"Fritz T, Murphy GC, Hill E (2007) Does a programmer\u2019s activity indicate knowledge of code? In: Proceedings of the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT International symposium on foundations of software engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007. ACM, pp 341\u2013350","DOI":"10.1145\/1287624.1287673"},{"key":"10568_CR26","unstructured":"Gerds TA (2023) prodlim: product-limit estimation for censored event history analysis. https:\/\/CRAN.R-project.org\/package=prodlim, r package version 2023.08.28"},{"key":"10568_CR27","doi-asserted-by":"crossref","unstructured":"Gopstein D, Iannacone J, Yan Y, DeLong L, Zhuang Y, Yeh MK, Cappos J (2017) Understanding misunderstandings in source code. In: Proceedings of the 2017 11th joint meeting on foundations of software engineering, ESEC\/FSE 2017, Paderborn, Germany, Sept. 4-8, 2017. ACM, pp 129\u2013139","DOI":"10.1145\/3106237.3106264"},{"key":"10568_CR28","doi-asserted-by":"publisher","unstructured":"Gopstein D, Zhou HH, Frankl P, Cappos J (2018) Prevalence of confusing code in software projects: atoms of confusion in the wild. In: Proceedings of the 15th international conference on mining software repositories, association for computing machinery, New York, USA, MSR \u201918, pp 281\u2013291. https:\/\/doi.org\/10.1145\/3196398.3196432","DOI":"10.1145\/3196398.3196432"},{"issue":"03","key":"10568_CR29","doi-asserted-by":"publisher","first-page":"137","DOI":"10.4236\/jsea.2009.23020","volume":"2","author":"J Graylin","year":"2009","unstructured":"Graylin J, Hale JE, Smith RK, David H, Kraft NA, Charles W et al (2009) Cyclomatic complexity and lines of code: empirical evidence of a stable linear relationship. J Softw Eng Appl 2(03):137","journal-title":"J Softw Eng Appl"},{"key":"10568_CR30","doi-asserted-by":"crossref","unstructured":"Gyori A, Franklin L, Dig D, Lahoda J (2013) Crossing the gap from imperative to functional programming through refactoring. In: Meyer B, Baresi L, Mezini M (eds) Joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ESEC\/FSE\u201913, Saint Petersburg, Russian Federation, August 18-26, 2013. ACM, pp 543\u2013553","DOI":"10.1145\/2491411.2491461"},{"issue":"2","key":"10568_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-10077-3","volume":"27","author":"S Hanenberg","year":"2022","unstructured":"Hanenberg S, Mehlhorn N (2022) Two n-of-1 self-trials on readability differences between anonymous inner classes (aics) and lambda expressions (les) on Java code snippets. Empir Softw Eng 27(2):1\u201339","journal-title":"Empir Softw Eng"},{"key":"10568_CR32","unstructured":"Herzig K, Just S, Zeller A (2015) It\u2019s not a bug, it\u2019s a feature: How misclassification impacts bug prediction. In: Software engineering & management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. M\u00e4rz - 20. M\u00e4rz 2015, Dresden, Germany, pp 103\u2013104"},{"key":"10568_CR33","doi-asserted-by":"publisher","unstructured":"Hoang T, Dam HK, Kamei Y, Lo D, Ubayashi N (2019) Deepjit: an end-to-end deep learning framework for just-in-time defect prediction. In: Proceedings of the 16th international conference on mining software repositories, MSR 2019, 26-27 May 2019, Montreal, Canada, pp 34\u201345. https:\/\/doi.org\/10.1109\/MSR.2019.00016","DOI":"10.1109\/MSR.2019.00016"},{"key":"10568_CR34","doi-asserted-by":"publisher","unstructured":"Huq SF, Sadiq AZ, Sakib K (2019) Understanding the effect of developer sentiment on fix-inducing changes: an exploratory study on github pull requests. In: 2019 26th Asia-Pacific Software Engineering Conference (APSEC), pp 514\u2013521. https:\/\/doi.org\/10.1109\/APSEC48747.2019.00075","DOI":"10.1109\/APSEC48747.2019.00075"},{"issue":"6","key":"10568_CR35","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2013","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N (2013) A large-scale empirical study of just-in-time quality assurance. IEEE Trans Software Eng 39(6):757\u2013773. https:\/\/doi.org\/10.1109\/TSE.2012.70","journal-title":"IEEE Trans Software Eng"},{"issue":"5","key":"10568_CR36","doi-asserted-by":"publisher","first-page":"2072","DOI":"10.1007\/s10664-015-9400-x","volume":"21","author":"Y Kamei","year":"2016","unstructured":"Kamei Y, Fukushima T, McIntosh S, Yamashita K, Ubayashi N, Hassan AE (2016) Studying just-in-time defect prediction using cross-project models. Empir Softw Eng 21(5):2072\u20132106. https:\/\/doi.org\/10.1007\/s10664-015-9400-x","journal-title":"Empir Softw Eng"},{"key":"10568_CR37","doi-asserted-by":"publisher","unstructured":"Kawrykow D, Robillard MP (2011) Non-essential changes in version histories. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011, pp 351\u2013360. https:\/\/doi.org\/10.1145\/1985793.1985842","DOI":"10.1145\/1985793.1985842"},{"key":"10568_CR38","doi-asserted-by":"crossref","unstructured":"Kim S, Jr EJW, Zhang Y (2008) Classifying software changes: clean or buggy? IEEE Trans Software Eng 34(2):181\u2013196","DOI":"10.1109\/TSE.2007.70773"},{"key":"10568_CR39","doi-asserted-by":"crossref","unstructured":"Langhout C, Aniche M (2021) Atoms of confusion in java. In: 29th IEEE\/ACM International conference on program comprehension, ICPC 2021, Madrid, Spain, May 20-21, 2021. IEEE, pp 25\u201335","DOI":"10.1109\/ICPC52881.2021.00012"},{"key":"10568_CR40","doi-asserted-by":"publisher","unstructured":"Lenarduzzi V, Lomio F, Huttunen H, Taibi D (2020) Are sonarqube rules inducing bugs? In: 27th IEEE International conference on software analysis, evolution and reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020, pp 501\u2013511. https:\/\/doi.org\/10.1109\/SANER48275.2020.9054821","DOI":"10.1109\/SANER48275.2020.9054821"},{"key":"10568_CR41","unstructured":"Logilab and Pylint contributors (2023) Pylint. https:\/\/pylint.pycqa.org\/"},{"key":"10568_CR42","doi-asserted-by":"crossref","unstructured":"Lucas W, Bonif\u00e1cio R, Canedo ED, Marc\u00edlio D, Lima F (2019) Does the introduction of lambda expressions improve the comprehension of Java programs? In: Proceedings of the XXXIII Brazilian symposium on software engineering, pp 187\u2013196","DOI":"10.1145\/3350768.3350791"},{"key":"10568_CR43","doi-asserted-by":"crossref","unstructured":"McCabe T (1976) A complexity measure. IEEE Trans on Softw Eng (4):308\u2013320","DOI":"10.1109\/TSE.1976.233837"},{"issue":"5","key":"10568_CR44","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TSE.2017.2693980","volume":"44","author":"S McIntosh","year":"2018","unstructured":"McIntosh S, Kamei Y (2018) Are fix-inducing changes a moving target? A longitudinal case study of just-in-time defect prediction. IEEE Trans Software Eng 44(5):412\u2013428. https:\/\/doi.org\/10.1109\/TSE.2017.2693980","journal-title":"IEEE Trans Software Eng"},{"key":"10568_CR45","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1007\/s10664-018-9666-x","volume":"24","author":"F Medeiros","year":"2019","unstructured":"Medeiros F, Lima G, Amaral G, Apel S, K\u00e4stner C, Ribeiro M, Gheyi R (2019) An investigation of misunderstanding code patterns in c open-source software projects. Empir Softw Eng 24:1693\u20131726","journal-title":"Empir Softw Eng"},{"key":"10568_CR46","doi-asserted-by":"crossref","unstructured":"Mehlhorn N, Hanenberg S (2022) Imperative versus declarative collection processing: an rct on the understandability of traditional loops versus the stream api in java. In: Proceedings of the 44th international conference on software engineering, pp 1157\u20131168","DOI":"10.1145\/3510003.3519016"},{"issue":"6","key":"10568_CR47","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.1007\/s10664-017-9512-6","volume":"22","author":"N Munaiah","year":"2017","unstructured":"Munaiah N, Kroh S, Cabrey C, Nagappan M (2017) Curating github for engineered software projects. Empir Softw Eng 22(6):3219\u20133253","journal-title":"Empir Softw Eng"},{"key":"10568_CR48","doi-asserted-by":"crossref","unstructured":"Myers L, Sirois MJ (2004) Spearman correlation coefficients, differences between. Encyclopedia of Statistical Sciences 12","DOI":"10.1002\/0471667196.ess5050"},{"issue":"3","key":"10568_CR49","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1007\/s10664-017-9535-z","volume":"23","author":"F Palomba","year":"2018","unstructured":"Palomba F, Bavota G, Di Penta M, Fasano F, Oliveto R, De Lucia A (2018) On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation. Empir Softw Eng 23(3):1188\u20131221. https:\/\/doi.org\/10.1007\/s10664-017-9535-z","journal-title":"Empir Softw Eng"},{"key":"10568_CR50","doi-asserted-by":"crossref","unstructured":"Pankratius V, Schmidt F, Garret\u00f3n G (2012) Combining functional and imperative programming for multicore software: an empirical study evaluating scala and java. In: 2012 34th International Conference on Software Engineering (ICSE). IEEE, pp 123\u2013133","DOI":"10.1109\/ICSE.2012.6227200"},{"key":"10568_CR51","unstructured":"Pythonorg (2022a) Python 3.0 - what\u2019s new https:\/\/docs.python.org\/3.0\/whatsnew\/3.0.html 03 Mar 2022"},{"key":"10568_CR52","unstructured":"Pythonorg (2022b) Python AST module https:\/\/docs.python.org\/3\/library\/ast.html (last access: 03\/10\/2022)"},{"key":"10568_CR53","doi-asserted-by":"crossref","unstructured":"Rahman F, Devanbu PT (2011) Ownership, experience and defects: a fine-grained study of authorship. In: Proceedings of the 33rd International conference on software engineering, ICSE 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011, pp 491\u2013500","DOI":"10.1145\/1985793.1985860"},{"key":"10568_CR54","doi-asserted-by":"crossref","unstructured":"Rao AE, Chimalakonda S (2020) An exploratory study towards understanding lambda expressions in Python. In: Proceedings of the evaluation and assessment in software engineering, pp 318\u2013323","DOI":"10.1145\/3383219.3383255"},{"key":"10568_CR55","doi-asserted-by":"publisher","unstructured":"Ray B, Hellendoorn V, Godhane S, Tu Z, Bacchelli A, Devanbu PT (2016) On the \u201cnaturalness\u201d of buggy code. In: Proceedings of the 38th international conference on software engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016, pp 428\u2013439. https:\/\/doi.org\/10.1145\/2884781.2884848","DOI":"10.1145\/2884781.2884848"},{"key":"10568_CR56","doi-asserted-by":"crossref","unstructured":"Ray B, Posnett D, Filkov V, Devanbu PT (2014) A large scale study of programming languages and code quality in github. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, pp 155\u2013165","DOI":"10.1145\/2635868.2635922"},{"key":"10568_CR57","volume-title":"Survival analysis","author":"G Rupert","year":"2011","unstructured":"Rupert G, Miller J (2011) Survival analysis, 2nd edn. John Wiley and Sons","edition":"2"},{"key":"10568_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSE.2017.2655524","volume":"PP","author":"G Salvaneschi","year":"2017","unstructured":"Salvaneschi G, Proksch S, Amann S, Nadi S, Mezini M (2017) On the positive effect of reactive programming on software comprehension: an empirical study. IEEE Trans Softw Eng PP:1\u20131. https:\/\/doi.org\/10.1109\/TSE.2017.2655524","journal-title":"IEEE Trans Softw Eng"},{"key":"10568_CR59","doi-asserted-by":"crossref","unstructured":"Schr\u00f6ter I, Kr\u00fcger J, Siegmund J, Leich T (2017) Comprehending studies on program comprehension. In: 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC). IEEE, pp 308\u2013311","DOI":"10.1109\/ICPC.2017.9"},{"issue":"2","key":"10568_CR60","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1049\/sej.1988.0003","volume":"3","author":"M Shepperd","year":"1988","unstructured":"Shepperd M (1988) A critique of cyclomatic complexity as a software metric. Softw Eng J 3(2):30\u201336","journal-title":"Softw Eng J"},{"issue":"5","key":"10568_CR61","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/S10664-013-9286-4","volume":"19","author":"J Siegmund","year":"2014","unstructured":"Siegmund J, K\u00e4stner C, Liebig J, Apel S, Hanenberg S (2014) Measuring and modeling programming experience. Empir Softw Eng 19(5):1299\u20131334. https:\/\/doi.org\/10.1007\/S10664-013-9286-4","journal-title":"Empir Softw Eng"},{"key":"10568_CR62","doi-asserted-by":"crossref","unstructured":"Sliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes? In: Proceedings of the 2005 international workshop on mining software repositories, MSR 2005, Saint Louis, Missouri, USA, May 17, 2005","DOI":"10.1145\/1083142.1083147"},{"key":"10568_CR63","doi-asserted-by":"publisher","unstructured":"Spadini D, Aniche MF, Bacchelli A (2018) Pydriller: python framework for mining software repositories. In: Leavens GT, Garcia A, Pasareanu CS (eds) Proceedings of the 2018 ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering, ESEC\/SIGSOFT FSE 2018, Lake Buena Vista, FL, USA, November 04-09, 2018. ACM, pp 908\u2013911. https:\/\/doi.org\/10.1145\/3236024.3264598","DOI":"10.1145\/3236024.3264598"},{"key":"10568_CR64","unstructured":"Switowskicom (2022) For loop vs. list comprehension https:\/\/switowski.com\/blog\/for-loop-vs-list-comprehension (last access: 03\/10\/2022)"},{"issue":"12","key":"10568_CR65","doi-asserted-by":"publisher","first-page":"2414","DOI":"10.1587\/transinf.2019MPP0002","volume":"102","author":"H Tanaka","year":"2019","unstructured":"Tanaka H, Matsumoto S, Kusumoto S (2019) A study on the current status of functional idioms in Java. IEICE Trans Inf Syst 102(12):2414\u20132422","journal-title":"IEICE Trans Inf Syst"},{"key":"10568_CR66","unstructured":"Therneau TM (2023) A Package for Survival Analysis in R. https:\/\/CRAN.R-project.org\/package=survival, r package version 3.5-7"},{"key":"10568_CR67","doi-asserted-by":"crossref","unstructured":"Tsantalis N, Mazinanian D, Rostami S (2017) Clone refactoring with lambda expressions. In: Uchitel S, Orso A, Robillard MP (Eds) Proceedings of the 39th International conference on software engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017. IEEE \/ ACM, pp 60\u201370","DOI":"10.1109\/ICSE.2017.14"},{"issue":"11","key":"10568_CR68","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TSE.2017.2653105","volume":"43","author":"M Tufano","year":"2017","unstructured":"Tufano M, Palomba F, Bavota G, Oliveto R, Di Penta M, De Lucia A, Poshyvanyk D (2017b) When and why your code starts to smell bad (and whether the smells go away). IEEE Trans Software Eng 43(11):1063\u20131088. https:\/\/doi.org\/10.1109\/TSE.2017.2653105","journal-title":"IEEE Trans Software Eng"},{"key":"10568_CR69","doi-asserted-by":"publisher","unstructured":"Tufano M, Bavota G, Poshyvanyk D, Di Penta M, Oliveto R, De Lucia A (2017a) An empirical study on developer-related factors characterizing fix-inducing commits. J Softw Evol Process 29(1). https:\/\/doi.org\/10.1002\/smr.1797","DOI":"10.1002\/smr.1797"},{"key":"10568_CR70","doi-asserted-by":"crossref","unstructured":"Uesbeck PM, Stefik A, Hanenberg S, Pedersen J, Daleiden P (2016) An empirical study on the impact of c++ lambdas and programmer experience. In: Proceedings of the 38th international conference on software engineering, pp 760\u2013771","DOI":"10.1145\/2884781.2884849"},{"key":"10568_CR71","unstructured":"Vandeput N (2022) List comprehensions vs. for loops: It is not what you think. https:\/\/towardsdatascience.com\/list-comprehensions-vs-for-loops-it-is-not-what-you-think-34071d4d8207, (Last access: 03\/10\/2022)"},{"key":"10568_CR72","doi-asserted-by":"publisher","unstructured":"Zampetti F, Belias F, Zid C, Antoniol G, Penta MD (2022) An empirical study on the fault-inducing effect of functional constructs in python. In: IEEE International conference on software maintenance and evolution, ICSME 2022, Limassol, Cyprus, October 3-7, 2022. IEEE, pp 47\u201358. https:\/\/doi.org\/10.1109\/ICSME55016.2022.00013","DOI":"10.1109\/ICSME55016.2022.00013"},{"key":"10568_CR73","doi-asserted-by":"publisher","unstructured":"Zampetti F, Zid C, Antoniol G, Di Penta M (2024). The dark side of functional constructs: a quantitative and qualitative analysis of their fix-inducing effects. https:\/\/doi.org\/10.5281\/zenodo.11403724","DOI":"10.5281\/zenodo.11403724"},{"key":"10568_CR74","doi-asserted-by":"crossref","unstructured":"Zhang Z, Xing Z, Xia X, Xu X, Zhu L (2022) Making python code idiomatic by automatic refactoring non-idiomatic python code with pythonic idioms. In: Proceedings of the 30th ACM joint European software engineering conference and symposium on the foundations of software engineering, ESEC\/FSE 2022, Singapore, Singapore, November 14-18, 2022. ACM, pp 696\u2013708","DOI":"10.1145\/3540250.3549143"},{"key":"10568_CR75","doi-asserted-by":"crossref","unstructured":"Zhang Z, Xing Z, Xia X, Xu X, Zhu L, Lu Q (2023) Faster or slower? performance mystery of python idioms unveiled with empirical evidence. In: 45th IEEE\/ACM International conference on software engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023. IEEE, pp 1495\u20131507","DOI":"10.1109\/ICSE48619.2023.00130"},{"key":"10568_CR76","doi-asserted-by":"crossref","unstructured":"Zheng M, Yang J, Wen M, Zhu H, Liu Y, Jin H (2021) Why do developers remove lambda expressions in Java? In: 2021 36th IEEE\/ACM international conference on Automated Software Engineering (ASE). IEEE, pp 67\u201378","DOI":"10.1109\/ASE51524.2021.9678600"},{"key":"10568_CR77","doi-asserted-by":"crossref","unstructured":"Zid C, Belias F, Khomh F, Di Penta M, Antoniol G (2024a) List comprehension versus for loops performance in real python projects: should we care? In: IEEE International conference on software analysis, evolution and reengineering (SANER 2024), Tue 12 - Fri 15 March 2024 Rovaniemi , Finland. ACM\/IEEE","DOI":"10.1109\/SANER60148.2024.00066"},{"key":"10568_CR78","unstructured":"Zid C, Zampetti F, Antoniol G, Di Penta M (2024b) A study on the pythonic functional constructs\u2019 understandability. In: Proceedings of the 45th ACM\/IEEE International conference on software engineering (ICSE 2024), May 14-20 2024, Lisbon, Portugal. ACM\/IEEE"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10568-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-024-10568-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10568-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T14:09:10Z","timestamp":1736258950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-024-10568-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,22]]},"references-count":78,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10568"],"URL":"https:\/\/doi.org\/10.1007\/s10664-024-10568-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,22]]},"assertion":[{"value":"10 October 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"9"}}