{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T18:48:26Z","timestamp":1758048506949,"version":"3.44.0"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T00:00:00Z","timestamp":1753315200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T00:00:00Z","timestamp":1753315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Identifier names are crucial components of code, serving as primary clues for developers to understand program behavior. This paper investigates the linguistic structure of identifier names by extending the concept of grammar patterns, which represent the part-of-speech (PoS) sequences underlying identifier phrases. The specific focus is on closed syntactic categories (e.g., prepositions, conjunctions, determiners), which are rarely studied in software engineering despite their central role in general natural language. To study these categories, the Closed Category Identifier Dataset (CCID), a new manually annotated dataset of 1,275 identifiers drawn from 30 open-source systems, is constructed and presented. The relationship between closed-category grammar patterns and program behavior is then analyzed using grounded-theory-inspired coding, statistical, and pattern analysis. The results reveal recurring structures that developers use to express concepts such as control flow, data transformation, temporal reasoning, and other behavioral roles through naming. This work contributes an empirical foundation for understanding how linguistic resources encode behavior in identifier names and supports new directions for research in naming, program comprehension, and education.<\/jats:p>","DOI":"10.1007\/s10664-025-10699-x","type":"journal-article","created":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T13:24:39Z","timestamp":1753363479000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the structure and semantics of identifier names containing closed syntactic category words"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8838-4074","authenticated-orcid":false,"given":"Christian D.","family":"Newman","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Peruma","sequence":"additional","affiliation":[]},{"given":"Eman Abdullah","family":"AlOmar","sequence":"additional","affiliation":[]},{"given":"Mahie","family":"Crabbe","sequence":"additional","affiliation":[]},{"given":"Syreen","family":"Banabilah","sequence":"additional","affiliation":[]},{"given":"Reem S.","family":"Alsuhaibani","sequence":"additional","affiliation":[]},{"given":"Michael J.","family":"Decker","sequence":"additional","affiliation":[]},{"given":"Farhad","family":"Akhbardeh","sequence":"additional","affiliation":[]},{"given":"Marcos","family":"Zampieri","sequence":"additional","affiliation":[]},{"given":"Mohamed Wiem","family":"Mkaouer","sequence":"additional","affiliation":[]},{"given":"Jonathan I.","family":"Maletic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"key":"10699_CR1","doi-asserted-by":"publisher","unstructured":"Abebe SL, Tonella P (2011) Towards the extraction of domain concepts from the identifiers. In: Proceedings of the 2011 18th Working Conference on Reverse Engineering, WCRE \u201911, p. 77\u201386. IEEE Computer Society, USA. https:\/\/doi.org\/10.1109\/WCRE.2011.19","DOI":"10.1109\/WCRE.2011.19"},{"key":"10699_CR2","doi-asserted-by":"publisher","unstructured":"Abebe SL, Tonella P (2013) Automated identifier completion and replacement. In: 2013 17th European Conference on Software Maintenance and Reengineering, pp. 263\u2013272. https:\/\/doi.org\/10.1109\/CSMR.2013.35","DOI":"10.1109\/CSMR.2013.35"},{"key":"10699_CR3","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10664-010-9152-6","volume":"16","author":"S Adolph","year":"2011","unstructured":"Adolph S, Hall W, Kruchten P (2011) Using grounded theory to study the experience of software development. Empir. Softw. Eng. 16:487\u2013513. https:\/\/doi.org\/10.1007\/s10664-010-9152-6","journal-title":"Empir. Softw. Eng."},{"key":"10699_CR4","doi-asserted-by":"publisher","unstructured":"Al\u00a0Madi N (2023) Namesake: A checker of lexical similarity in identifier names. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201922. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3551349.3560441","DOI":"10.1145\/3551349.3560441"},{"key":"10699_CR5","doi-asserted-by":"publisher","unstructured":"Allamanis M, Barr ET, Bird C, Sutton C (2015) Suggesting accurate method and class names. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2015, pp. 38\u201349. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2786805.2786849","DOI":"10.1145\/2786805.2786849"},{"key":"10699_CR6","doi-asserted-by":"publisher","unstructured":"Alsuhaibani R, Newman C, Decker M, Collard M, Maletic J (2021) On the naming of methods: A survey of professional developers. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 587\u2013599. https:\/\/doi.org\/10.1109\/ICSE43902.2021.00061","DOI":"10.1109\/ICSE43902.2021.00061"},{"key":"10699_CR7","doi-asserted-by":"publisher","unstructured":"Alsuhaibani RS, Newman CD, Collard ML, Maletic JI (2015) Heuristic-based part-of-speech tagging of source code identifiers and comments. In: 2015 IEEE 5th Workshop on Mining Unstructured Data (MUD), pp. 1\u20136. https:\/\/doi.org\/10.1109\/MUD.2015.7327960","DOI":"10.1109\/MUD.2015.7327960"},{"key":"10699_CR8","doi-asserted-by":"publisher","unstructured":"Aman H, Amasaki S, Yokogawa T, Kawahara M (2024) A quantitative investigation of trends in confusing variable pairs through commits: Do confusing variable pairs survive? In: Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, EASE \u201924, p. 90\u201399. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3661167.3661228","DOI":"10.1145\/3661167.3661228"},{"key":"10699_CR9","doi-asserted-by":"publisher","unstructured":"Arnaoudova V, Di Penta M, Antoniol G, Gu\u00e9h\u00e9neuc Y (2013) A new family of software anti-patterns: Linguistic anti-patterns. In: 2013 17th European Conference on Software Maintenance and Reengineering, pp. 187\u2013196. https:\/\/doi.org\/10.1109\/CSMR.2013.28","DOI":"10.1109\/CSMR.2013.28"},{"issue":"5","key":"10699_CR10","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TSE.2014.2312942","volume":"40","author":"V Arnaoudova","year":"2014","unstructured":"Arnaoudova V, Eshkevari LM, Penta MD, Oliveto R, Antoniol G, Gueheneuc YG (2014) Repent: Analyzing the nature of identifier renamings. IEEE Trans. Softw. Eng. 40(5):502\u2013532. https:\/\/doi.org\/10.1109\/TSE.2014.2312942","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10699_CR11","doi-asserted-by":"publisher","unstructured":"Avidan E, Feitelson DG (2017) Effects of variable names on comprehension: An empirical study. In: 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), pp. 55\u201365. https:\/\/doi.org\/10.1109\/ICPC.2017.27","DOI":"10.1109\/ICPC.2017.27"},{"key":"10699_CR12","doi-asserted-by":"publisher","unstructured":"Binkley D, Hearn M, Lawrie D (2011) Improving identifier informativeness using part of speech information. In: Proceedings of the 8th Working Conference on Mining Software Repositories, MSR \u201911, pp. 203\u2013206. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/1985441.1985471","DOI":"10.1145\/1985441.1985471"},{"issue":"4","key":"10699_CR13","doi-asserted-by":"publisher","first-page":"2398","DOI":"10.1007\/s10664-017-9566-5","volume":"23","author":"D Binkley","year":"2018","unstructured":"Binkley D, Lawrie D, Morrell C (2018) The need for software specific natural language techniques. Empirical Softw. Engg. 23(4):2398\u20132425. https:\/\/doi.org\/10.1007\/s10664-017-9566-5","journal-title":"Empirical Softw. Engg."},{"key":"10699_CR14","doi-asserted-by":"publisher","unstructured":"Butler S, Wermelinger M, Yu Y (2015) A survey of the forms of java reference names. In: 2015 IEEE 23rd International Conference on Program Comprehension, pp. 196\u2013206. https:\/\/doi.org\/10.1109\/ICPC.2015.30","DOI":"10.1109\/ICPC.2015.30"},{"key":"10699_CR15","doi-asserted-by":"publisher","unstructured":"Butler S, Wermelinger M, Yu Y, Sharp H (2009) Relating identifier naming flaws and code quality: An empirical study. In: 2009 16th Working Conference on Reverse Engineering, pp. 31\u201335. https:\/\/doi.org\/10.1109\/WCRE.2009.50","DOI":"10.1109\/WCRE.2009.50"},{"key":"10699_CR16","doi-asserted-by":"crossref","unstructured":"Butler S, Wermelinger M, Yu Y, Sharp H (2010) Exploring the influence of identifier names on code quality: An empirical study. In: Software Maintenance and Reengineering (CSMR), 2010 14th European Conference on, pp. 156\u2013165. IEEE","DOI":"10.1109\/CSMR.2010.27"},{"key":"10699_CR17","doi-asserted-by":"publisher","unstructured":"Butler S, Wermelinger M, Yu Y, Sharp H (2011) Mining java class naming conventions. In: 2011 27th IEEE International Conference on Software Maintenance (ICSM), pp. 93\u2013102. https:\/\/doi.org\/10.1109\/ICSM.2011.6080776","DOI":"10.1109\/ICSM.2011.6080776"},{"key":"10699_CR18","doi-asserted-by":"publisher","unstructured":"Caprile, Tonella (2000) Restructuring program identifier names. In: Proceedings 2000 International Conference on Software Maintenance, pp. 97\u2013107. https:\/\/doi.org\/10.1109\/ICSM.2000.883022","DOI":"10.1109\/ICSM.2000.883022"},{"key":"10699_CR19","doi-asserted-by":"publisher","unstructured":"Caprile C, Tonella P (1999) Nomen est omen: analyzing the language of function identifiers. In: Sixth Working Conference on Reverse Engineering (Cat. No.PR00303), pp. 112\u2013122. https:\/\/doi.org\/10.1109\/WCRE.1999.806952","DOI":"10.1109\/WCRE.1999.806952"},{"key":"10699_CR20","doi-asserted-by":"publisher","unstructured":"Collard ML, Maletic JI (2016) srcml 1.0: Explore, analyze, and manipulate source code. In: 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 649\u2013649. https:\/\/doi.org\/10.1109\/ICSME.2016.36","DOI":"10.1109\/ICSME.2016.36"},{"issue":"2","key":"10699_CR21","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1147\/sj.282.0294","volume":"28","author":"TA Corbi","year":"1989","unstructured":"Corbi TA (1989) Program understanding: Challenge for the 1990s. IBM Syst. J. 28(2):294\u2013306. https:\/\/doi.org\/10.1147\/sj.282.0294","journal-title":"IBM Syst. J."},{"key":"10699_CR22","doi-asserted-by":"publisher","unstructured":"Corbin J, Strauss A (1990) Grounded theory research: Procedures, canons and evaluative criteria. Qual. Sociol. 19(6):3\u201321. https:\/\/doi.org\/10.1007\/BF00988593. URL https:\/\/doi.org\/10.1515\/zfsoz-1990-0602","DOI":"10.1007\/BF00988593"},{"issue":"3","key":"10699_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11219-006-9219-1","volume":"14","author":"F Deissenboeck","year":"2006","unstructured":"Deissenboeck F, Pizka M (2006) Concise and consistent naming. Software Qual. J. 14(3):261\u2013282. https:\/\/doi.org\/10.1007\/s11219-006-9219-1","journal-title":"Software Qual. J."},{"key":"10699_CR24","unstructured":"Deissenboeck F, Ratiu D (2006) A unified meta-model for concept-based reverse engineering. In: In Proceedings of the 3rd International Workshop on Metamodels, Schemas, Grammars and Ontologies (ATEM\u201906"},{"key":"10699_CR25","doi-asserted-by":"publisher","unstructured":"Dragan N, Collard ML, Maletic JI (2006) Reverse engineering method stereotypes. In: Proceedings of the 22Nd IEEE International Conference on Software Maintenance, ICSM \u201906, pp. 24\u201334. IEEE Computer Society, Washington, DC, USA. https:\/\/doi.org\/10.1109\/ICSM.2006.54","DOI":"10.1109\/ICSM.2006.54"},{"key":"10699_CR26","doi-asserted-by":"publisher","unstructured":"Etgar A, Friedman R, Haiman S, Perez D, Feitelson DG (2022) The effect of information content and length on name recollection. In: Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension, ICPC \u201922, p. 141\u2013151. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3524610.3529159","DOI":"10.1145\/3524610.3529159"},{"issue":"3","key":"10699_CR27","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1007\/s10664-019-09751-4","volume":"25","author":"S Fakhoury","year":"2020","unstructured":"Fakhoury S, Roy D, Ma Y, Arnaoudova V, Adesope O (2020) Measuring the impact of lexical and structural inconsistencies on developers\u2019 cognitive load during bug localization. Empirical Softw. Engg 25(3):2140\u20132178. https:\/\/doi.org\/10.1007\/s10664-019-09751-4","journal-title":"Empirical Softw. Engg"},{"key":"10699_CR28","doi-asserted-by":"publisher","unstructured":"Falleri JR, Huchard M, Lafourcade M, Nebut C, Prince V, Dao M (2010) Automatic extraction of a wordnet-like identifier network from software. In: Proceedings of the 2010 IEEE 18th International Conference on Program Comprehension, ICPC \u201910, p. 4\u201313. IEEE Computer Society, USA. https:\/\/doi.org\/10.1109\/ICPC.2010.12","DOI":"10.1109\/ICPC.2010.12"},{"issue":"1","key":"10699_CR29","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1049\/iet-sen:20070112","volume":"2","author":"ZP Fry","year":"2008","unstructured":"Fry ZP, Shepherd D, Hill E, Pollock L, Vijay-Shanker K (2008) Analysing source code: looking for useful verb-direct object pairs in all the right places. IET Software 2(1):27\u201336. https:\/\/doi.org\/10.1049\/iet-sen:20070112","journal-title":"IET Software"},{"key":"10699_CR30","doi-asserted-by":"crossref","unstructured":"Glassman EL, Fischer L, Scott J, Miller R (2015) Foobaz: Variable name feedback for student code at scale. Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. URL https:\/\/api.semanticscholar.org\/CorpusID:15810023","DOI":"10.1145\/2807442.2807495"},{"key":"10699_CR31","doi-asserted-by":"publisher","unstructured":"Gupta S, Malik S, Pollock L, Vijay-Shanker K (2013) Part-of-speech tagging of program identifiers for improved text-based software engineering tools. In: 2013 21st International Conference on Program Comprehension (ICPC), pp. 3\u201312. https:\/\/doi.org\/10.1109\/ICPC.2013.6613828","DOI":"10.1109\/ICPC.2013.6613828"},{"key":"10699_CR32","doi-asserted-by":"publisher","unstructured":"Hellendoorn VJ, Bird C, Barr ET, Allamanis M (2018) Deep learning type inference. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2018, p. 152\u2013162. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3236024.3236051","DOI":"10.1145\/3236024.3236051"},{"key":"10699_CR33","unstructured":"Hill E (2010) Integrating natural language and program structure information to improve software search and exploration. Ph.D. thesis, Newark, DE, USA. AAI3423409"},{"key":"10699_CR34","doi-asserted-by":"publisher","unstructured":"Hill E, Fry ZP, Boyd H, Sridhara G, Novikova Y, Pollock L, Vijay-Shanker K (2008) Amap: Automatically mining abbreviation expansions in programs to enhance software maintenance tools. In: Proceedings of the 2008 International Working Conference on Mining Software Repositories, MSR \u201908, p. 79\u201388. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/1370750.1370771","DOI":"10.1145\/1370750.1370771"},{"issue":"10","key":"10699_CR35","doi-asserted-by":"publisher","first-page":"3808","DOI":"10.1109\/TSE.2021.3106280","volume":"48","author":"R Hoda","year":"2022","unstructured":"Hoda R (2022) Socio-technical grounded theory for software engineering. IEEE Trans. Software Eng. 48(10):3808\u20133832. https:\/\/doi.org\/10.1109\/TSE.2021.3106280","journal-title":"IEEE Trans. Software Eng."},{"key":"10699_CR36","doi-asserted-by":"publisher","unstructured":"Hofmeister J, Siegmund J, Holt DV (2017) Shorter identifier names take longer to comprehend. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 217\u2013227. https:\/\/doi.org\/10.1109\/SANER.2017.7884623","DOI":"10.1109\/SANER.2017.7884623"},{"key":"10699_CR37","doi-asserted-by":"publisher","unstructured":"Host E, Ostvold B (2007) The programmer\u2019s lexicon, volume i: The verbs. pp. 193\u2013 202. https:\/\/doi.org\/10.1109\/SCAM.2007.18","DOI":"10.1109\/SCAM.2007.18"},{"key":"10699_CR38","unstructured":"H\u00f8st EW (2011) Meaningful method names"},{"key":"10699_CR39","doi-asserted-by":"publisher","unstructured":"H\u00f8st EW, \u00d8stvold BM (2009) Debugging method names. In: Proceedings of the 23rd European Conference on ECOOP 2009 \u2014 Object-Oriented Programming, Genoa, pp. 294\u2013317. Springer-Verlag, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-03013-0_14","DOI":"10.1007\/978-3-642-03013-0_14"},{"key":"10699_CR40","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-00434-6_20","volume-title":"Software Language Engineering","author":"EW H\u00f8st","year":"2009","unstructured":"H\u00f8st EW, \u00d8stvold BM (2009) The java programmer\u2019s phrase book. In: Ga\u0161evi\u0107 D, L\u00e4mmel R, Van Wyk E (eds) Software Language Engineering. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 322\u2013341"},{"key":"10699_CR41","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-19440-5_14","volume-title":"Software Language Engineering","author":"EW H\u00f8st","year":"2011","unstructured":"H\u00f8st EW, \u00d8stvold BM (2011) Canonical method names for java. In: Malloy B, Staab S, van den Brand M (eds) Software Language Engineering. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 226\u2013245"},{"key":"10699_CR42","doi-asserted-by":"publisher","unstructured":"Hucka M (2018) Spiral: splitters for identifiers in source code files. Journal of Open Source Software 3:653. https:\/\/doi.org\/10.21105\/joss.00653","DOI":"10.21105\/joss.00653"},{"key":"10699_CR43","doi-asserted-by":"publisher","unstructured":"Kashiwabara Y, Onizuka Y, Ishio T, Hayase Y, Yamamoto T, Inoue K (2014) Recommending verbs for rename method using association rule mining. In: 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), pp. 323\u2013327. https:\/\/doi.org\/10.1109\/CSMR-WCRE.2014.6747186","DOI":"10.1109\/CSMR-WCRE.2014.6747186"},{"key":"10699_CR44","doi-asserted-by":"publisher","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2006) What\u2019s in a name? a study of identifiers. In: 14th IEEE International Conference on Program Comprehension (ICPC\u201906), pp. 3\u201312. https:\/\/doi.org\/10.1109\/ICPC.2006.51","DOI":"10.1109\/ICPC.2006.51"},{"key":"10699_CR45","unstructured":"Liblit B, Begel A, Sweetser E (2006) Cognitive perspectives on the role of naming in computer programs. In: In Proc. of the 18th Annual Psychology of Programming Workshop"},{"issue":"9","key":"10699_CR46","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/TSE.2015.2427831","volume":"41","author":"H Liu","year":"2015","unstructured":"Liu H, Liu Q, Liu Y, Wang Z (2015) Identifying renaming opportunities by expanding conducted rename refactorings. IEEE Trans. Software Eng. 41(9):887\u2013900","journal-title":"IEEE Trans. Software Eng."},{"key":"10699_CR47","doi-asserted-by":"crossref","unstructured":"Liu H, Liu Q, Staicu CA, Pradel M, Luo Y (2016) Nomen est omen: Exploring and exploiting similarities between argument and parameter names. In: Software Engineering (ICSE), 2016 IEEE\/ACM 38th International Conference on, pp. 1063\u20131073. IEEE","DOI":"10.1145\/2884781.2884841"},{"key":"10699_CR48","doi-asserted-by":"crossref","unstructured":"Liu K, Kim D, F\u00a0Bissyand\u00e9 T, Kim T, Kim K, Koyuncu A, Kim S, Le\u00a0Traon Y (2019) Learning to spot and refactor inconsistent method names. In: Proceedings of the 40th International Conference on Software Engineering, ICSE 2019. ACM, New York, NY, USA","DOI":"10.1109\/ICSE.2019.00019"},{"key":"10699_CR49","doi-asserted-by":"publisher","unstructured":"Malik RS, Patra J, Pradel M (2019) Nl2type: Inferring javascript function types from natural language information. In: Proceedings of the 41st International Conference on Software Engineering, ICSE \u201919, p. 304\u2013315. IEEE Press. https:\/\/doi.org\/10.1109\/ICSE.2019.00045","DOI":"10.1109\/ICSE.2019.00045"},{"key":"10699_CR50","volume-title":"Clean Code: A Handbook of Agile Software Craftsmanship","author":"RC Martin","year":"2008","unstructured":"Martin RC (2008) Clean Code: A Handbook of Agile Software Craftsmanship, 1st edn. Prentice Hall PTR, Upper Saddle River, NJ, USA","edition":"1"},{"issue":"11","key":"10699_CR51","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller GA (1995) Wordnet: a lexical database for english. Commun. ACM 38(11):39\u201341","journal-title":"Commun. ACM"},{"issue":"6","key":"10699_CR52","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.1007\/s10664-017-9512-6","volume":"22","author":"N Munaiah","year":"2017","unstructured":"Munaiah N, Kroh S, Cabrey C, Nagappan M (2017) Curating github for engineered software projects. Empir. Softw. Eng. 22(6):3219\u20133253. https:\/\/doi.org\/10.1007\/s10664-017-9512-6","journal-title":"Empir. Softw. Eng."},{"key":"10699_CR53","unstructured":"Newman C, Decker M, Alsuhaibani R (2021) Identifier name structure catalogue URL https:\/\/github.com\/SCANL\/identifier_name_structure_catalogue [Online]. Available: https:\/\/github.com\/SCANL\/identifier_name_structure_catalogue"},{"key":"10699_CR54","doi-asserted-by":"publisher","unstructured":"Newman CD, AlSuhaibani RS, Collard ML, Maletic JI (2017) Lexical categories for source code identifiers. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 228\u2013239. https:\/\/doi.org\/10.1109\/SANER.2017.7884624","DOI":"10.1109\/SANER.2017.7884624"},{"key":"10699_CR55","doi-asserted-by":"publisher","unstructured":"Newman CD, AlSuhaibani RS, Decker MJ, Peruma A, Kaushik D, Mkaouer MW, Hill E (2020) On the generation, structure, and semantics of grammar patterns in source code identifiers. J. Syst. Softw. 170(110):740. https:\/\/doi.org\/10.1016\/j.jss.2020.110740. URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121220301680","DOI":"10.1016\/j.jss.2020.110740"},{"key":"10699_CR56","doi-asserted-by":"crossref","unstructured":"Newman CD, Decker MJ, AlSuhaibani RS, Peruma A, Kaushik D, Hill E (2019) An empirical study of abbreviations and expansions in software artifacts. In: Proceedings of the 35th IEEE International Conference on Software Maintenance. IEEE","DOI":"10.1109\/ICSME.2019.00040"},{"issue":"9","key":"10699_CR57","doi-asserted-by":"publisher","first-page":"3506","DOI":"10.1109\/TSE.2021.3098242","volume":"48","author":"CD Newman","year":"2022","unstructured":"Newman CD, Decker MJ, Alsuhaibani RS, Peruma A, Mkaouer MW, Mohapatra S, Vishnoi T, Zampieri M, Sheldon TJ, Hill E (2022) An ensemble approach for annotating source code identifiers with part-of-speech tags. IEEE Trans. Software Eng. 48(9):3506\u20133522. https:\/\/doi.org\/10.1109\/TSE.2021.3098242","journal-title":"IEEE Trans. Software Eng."},{"key":"10699_CR58","doi-asserted-by":"publisher","unstructured":"Olney W, Hill E, Thurber C, Lemma B (2016) Part of speech tagging java method names. In: 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 483\u2013487. https:\/\/doi.org\/10.1109\/ICSME.2016.80","DOI":"10.1109\/ICSME.2016.80"},{"key":"10699_CR59","doi-asserted-by":"publisher","unstructured":"Osumi Y, Umekawa N, Komata H, Hayashi S (2022) Empirical study of co-renamed identifiers. In: 2022 29th Asia-Pacific Software Engineering Conference (APSEC), pp. 71\u201380. https:\/\/doi.org\/10.1109\/APSEC57359.2022.00019","DOI":"10.1109\/APSEC57359.2022.00019"},{"key":"10699_CR60","doi-asserted-by":"publisher","unstructured":"Parsa S, Zakeri-Nasrabadi M, Ekhtiarzadeh M, Ramezani M (2023) Method name recommendation based on source code metrics. Journal of Computer Languages 74(101):177. https:\/\/doi.org\/10.1016\/j.cola.2022.101177. URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2590118422000740","DOI":"10.1016\/j.cola.2022.101177"},{"key":"10699_CR61","doi-asserted-by":"publisher","unstructured":"Peruma A, Hu E, Chen J, AlOmar EA, Mkaouer MW, Newman CD (2021) Using grammar patterns to interpret test method name evolution. In: 2021 IEEE\/ACM 29th International Conference on Program Comprehension (ICPC), pp. 335\u2013346. https:\/\/doi.org\/10.1109\/ICPC52881.2021.00039","DOI":"10.1109\/ICPC52881.2021.00039"},{"key":"10699_CR62","doi-asserted-by":"publisher","unstructured":"Peruma A, Mkaouer MW, Decker MJ, Newman CD (2018) An empirical investigation of how and why developers rename identifiers. In: International Workshop on Refactoring 2018. https:\/\/doi.org\/10.1145\/3242163.3242169. URL http:\/\/doi.acm.org\/10.1145\/3242163.3242169","DOI":"10.1145\/3242163.3242169"},{"key":"10699_CR63","doi-asserted-by":"crossref","unstructured":"Peruma A, Mkaouer MW, Decker MJ, Newman CD (2019) Contextualizing rename decisions using refactorings and commit messages. In: Proceedings of the 19th IEEE International Working Conference on Source Code Analysis and Manipulation. IEEE","DOI":"10.1109\/SCAM.2019.00017"},{"key":"10699_CR64","doi-asserted-by":"publisher","unstructured":"Peruma A, Mkaouer MW, Decker MJ, Newman CD (2020) Contextualizing rename decisions using refactorings, commit messages, and data types. J. Syst. Softw. 169(110):704. https:\/\/doi.org\/10.1016\/j.jss.2020.110704. URL http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121220301503","DOI":"10.1016\/j.jss.2020.110704"},{"key":"10699_CR65","doi-asserted-by":"publisher","unstructured":"Peruma A, Newman CD (2023) Understanding digits in identifier names: An exploratory study. In: Proceedings of the 1st International Workshop on Natural Language-Based Software Engineering, NLBSE \u201922, p. 9\u201316. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3528588.3528657","DOI":"10.1145\/3528588.3528657"},{"key":"10699_CR66","doi-asserted-by":"publisher","unstructured":"Ratiu D, Deissenboeck F (2006) Programs are knowledge bases. pp. 79\u2013 83. https:\/\/doi.org\/10.1109\/ICPC.2006.41","DOI":"10.1109\/ICPC.2006.41"},{"key":"10699_CR67","doi-asserted-by":"publisher","unstructured":"Ratiu D, Deissenboeck F (2007) From reality to programs and (not quite) back again. In: Proceedings of the 15th IEEE International Conference on Program Comprehension, ICPC \u201907, p. 91\u2013102. IEEE Computer Society, USA. https:\/\/doi.org\/10.1109\/ICPC.2007.22","DOI":"10.1109\/ICPC.2007.22"},{"key":"10699_CR68","doi-asserted-by":"publisher","unstructured":"Schankin A, Berger A, Holt DV, Hofmeister JC, Riedel T, Beigl M (2018) Descriptive compound identifier names improve source code comprehension. In: Proceedings of the 26th Conference on Program Comprehension, ICPC \u201918, pp. 31\u201340. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/3196321.3196332. URL http:\/\/doi.acm.org\/10.1145\/3196321.3196332","DOI":"10.1145\/3196321.3196332"},{"key":"10699_CR69","doi-asserted-by":"publisher","unstructured":"Shepherd D, Fry ZP, Hill E, Pollock L, Vijay-Shanker K (2007) Using natural language program analysis to locate and understand action-oriented concerns. In: Proceedings of the 6th International Conference on Aspect-oriented Software Development, AOSD \u201907, pp. 212\u2013224. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/1218563.1218587. URL http:\/\/doi.acm.org\/10.1145\/1218563.1218587","DOI":"10.1145\/1218563.1218587"},{"key":"10699_CR70","doi-asserted-by":"publisher","unstructured":"Singer J, Kirkham C (2008) Exploiting the correspondence between micro patterns and class names. In: 2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation, pp. 67\u201376. https:\/\/doi.org\/10.1109\/SCAM.2008.23","DOI":"10.1109\/SCAM.2008.23"},{"key":"10699_CR71","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884833","author":"KJ Stol","year":"2016","unstructured":"Stol KJ, Ralph P, Fitzgerald B (2016). Grounded theory in software engineering research: A critical review and guidelines. https:\/\/doi.org\/10.1145\/2884781.2884833","journal-title":"Grounded theory in software engineering research: A critical review and guidelines."},{"key":"10699_CR72","first-page":"143","volume":"4","author":"AA Takang","year":"1996","unstructured":"Takang AA, Grubb PA, Macredie RD (1996) The effects of comments and identifier names on program comprehensibility: an experimental investigation. J. Prog. Lang. 4:143\u2013167","journal-title":"J. Prog. Lang."},{"key":"10699_CR73","doi-asserted-by":"publisher","unstructured":"Toutanova K, Manning CD (2000) Enriching the knowledge sources used in a maximum entropy part-of-speech tagger. In: Proceedings of the 2000 Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora: Held in Conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 13, EMNLP \u201900, pp. 63\u201370. Association for Computational Linguistics, Stroudsburg, PA, USA. https:\/\/doi.org\/10.3115\/1117794.1117802","DOI":"10.3115\/1117794.1117802"},{"key":"10699_CR74","doi-asserted-by":"publisher","unstructured":"van\u00a0der Werf V, Swidan A, Hermans F, Specht M, Aivaloglou E (2024) Teachers\u2019 beliefs and practices on the naming of variables in introductory python programming courses. In: Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET \u201924, p. 368\u2013379. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3639474.3640069","DOI":"10.1145\/3639474.3640069"},{"issue":"4","key":"10699_CR75","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.1109\/TSE.2022.3227559","volume":"49","author":"J Zhang","year":"2023","unstructured":"Zhang J, Liu S, Gong L, Zhang H, Huang Z, Jiang H (2023) Beqain: An effective and efficient identifier normalization approach with bert and the question answering system. IEEE Trans. Software Eng. 49(4):2597\u20132620. https:\/\/doi.org\/10.1109\/TSE.2022.3227559","journal-title":"IEEE Trans. Software Eng."}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10699-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10699-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10699-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T08:54:00Z","timestamp":1757753640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10699-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,24]]},"references-count":75,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["10699"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10699-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2025,7,24]]},"assertion":[{"value":"1 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work does not involve human or animal subjects and does not require IRB approval.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This work does not involve human or animal subjects and does not require informed consent.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"We have no competing\/conflicting interests to report.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"Not Applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Number"}}],"article-number":"148"}}