{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:14:25Z","timestamp":1774264465264,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1007\/s11219-006-9219-1","type":"journal-article","created":{"date-parts":[[2006,7,23]],"date-time":"2006-07-23T01:03:26Z","timestamp":1153616606000},"page":"261-282","source":"Crossref","is-referenced-by-count":180,"title":["Concise and consistent naming"],"prefix":"10.1007","volume":"14","author":[{"given":"Florian","family":"Deissenboeck","sequence":"first","affiliation":[]},{"given":"Markus","family":"Pizka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9219_CR1","unstructured":"Pigoski, T.M. 1996 Practical Software Maintenance. Wiley Computer Publishing."},{"key":"9219_CR2","unstructured":"Lehman, M. 2003 Software evolution threat and challenge. Professorial and Jubilee Lecture (2003) 9th international Stevens Award, hosted by ICSM."},{"issue":"3","key":"9219_CR3","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/332084.332092","volume":"4","author":"D. Low","year":"1998","unstructured":"Low, D. 1998 Protecting Java code via code obfuscation. Crossroads 4(3) 21\u201323.","journal-title":"Crossroads"},{"key":"9219_CR4","unstructured":"Sun Microsystems Code conventions for the Java programming language. Technical report, Santa Clara, CA (1999)."},{"key":"9219_CR5","unstructured":"Henricson, M., Nyquist, E. 1992 Programming in C++: Rules and recommendations. Technical report, Ellemtel Telecommunication Systems Laboratories."},{"issue":"3","key":"9219_CR6","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1147\/sj.153.0182","volume":"15","author":"M.E. Fagan","year":"1976","unstructured":"Fagan, M.E. 1976 Design and code inspections to reduce errors in program development. IBM Systems Journal 15(3) 182\u2013211.","journal-title":"IBM Systems Journal"},{"key":"9219_CR7","doi-asserted-by":"crossref","unstructured":"Oman, P.W., Cook, C.R. Typographic style is more than cosmetic. ACM Communications 33(5) (1990).","DOI":"10.1145\/78607.78611"},{"issue":"2","key":"9219_CR8","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/130973.130975","volume":"27","author":"M. Arab","year":"1992","unstructured":"Arab, M. 1992 Enhancing program comprehension: formatting and documenting. SIGPLAN Not. 27(2) 37\u201346.","journal-title":"SIGPLAN Not"},{"key":"9219_CR9","doi-asserted-by":"crossref","unstructured":"Sneed, H.M. 1996 Object-oriented cobol recycling. In: WCRE \u201996, IEEE Computer Society 169.","DOI":"10.1109\/WCRE.1996.558901"},{"key":"9219_CR10","unstructured":"Biggerstaff, T.J., Mitbander, B.G., Webster, D. 1993 The concept assignment problem in program understanding. In: ICSE \u201993, IEEE CS Press."},{"key":"9219_CR11","unstructured":"Anquetil, N., Lethbridge, T. 1998 Assessing the relevance of identifier names in a legacy software system. In: CASCON \u201998, IBM Press 4."},{"key":"9219_CR12","doi-asserted-by":"crossref","unstructured":"Rajlich, V., Wilde, N. 2002 The role of concepts in program comprehension. In: IWPC \u201902, IEEE CS 271.","DOI":"10.1109\/WPC.2002.1021348"},{"issue":"1","key":"9219_CR13","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1002\/smr.4360070105","volume":"7","author":"N. Wilde","year":"1995","unstructured":"Wilde, N., Scully, M.C. 1995 Software reconnaissance: mapping program features to code. Journal of Software Maintenance 7(1) 49\u201362.","journal-title":"Journal of Software Maintenance"},{"key":"9219_CR14","doi-asserted-by":"crossref","unstructured":"Chen, K., Rajlich, V. 2000 Case study of feature location using dependence graph. In: IWPC \u201900, IEEE CS 241.","DOI":"10.1109\/WPC.2000.852498"},{"key":"9219_CR15","unstructured":"Shneiderman, B. Software psychology. Winthrop Publishers, Inc. (1980)."},{"key":"9219_CR16","volume-title":"Cognitive Psychology and its implications","author":"J.R. Anderson","year":"1995","unstructured":"Anderson, J.R. 1995 Cognitive Psychology and its implications. W. H. Freeman and Co., New Jersey."},{"key":"9219_CR17","unstructured":"Wilson, J.Q., Kelling, G.L. 1982 Broken windows. The Atlantic Monthly 249(3)."},{"key":"9219_CR18","unstructured":"Hunt, A., Thomas, D. 1999 The pragmatic programmer: From journeyman to master."},{"key":"9219_CR19","unstructured":"Weinberg, G.M. 1971 The psychology of computer programming. Van Nostrand Reinhold Co."},{"key":"9219_CR20","unstructured":"Robertson, J., Robertson, S. 2004 Volere template v10.1. Requirements specification template, Atlantic Systems Guild."},{"issue":"2","key":"9219_CR21","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1145\/356876.356882","volume":"14","author":"F.W. Allen","year":"1982","unstructured":"Allen, F.W., Loomis, M.E.S., Mannino, M.V. 1982 The integrated dictionary\/directory system. ACM Comput. Surv. 14(2) 245\u2013286.","journal-title":"ACM Comput. Surv."},{"key":"9219_CR22","first-page":"132","volume-title":"Contemporary Linguistics: An introduction","author":"W. O\u2019Grady","year":"1996","unstructured":"O\u2019Grady, W., de Guzman, V.P. 1996 Morphology: The analysis of word structure. In O\u2019Grady, W., Dobrovolsky, M., Katamba, F., eds.: Contemporary Linguistics: An introduction. 3rd. edn. Longman, London and New York 132\u2013180.","edition":"3rd. edn."},{"key":"9219_CR23","doi-asserted-by":"crossref","unstructured":"Costello, F. 2002 Investigating creative language: People\u2019s choice of words in the production of novel noun-noun compounds. In: Proceedings of the 24th Annual Conference of the Cognitive Science Society. 232\u2013237.","DOI":"10.4324\/9781315782379-77"},{"key":"9219_CR24","unstructured":"van Rysselberghe, F., Demeyer, S. 2003 Evaluating clone detection techniques. In: ELISA 03. 25\u201336."},{"key":"9219_CR25","unstructured":"Baxter, I., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L. 1998 Clone detection using abstract syntax trees."},{"issue":"1","key":"9219_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/32.895984","volume":"27","author":"S.G. Eick","year":"2001","unstructured":"Eick, S.G., Graves, T.L., Karr, A.F., Marron, J.S., Mockus, A. 2001 Does code decay? Assessing the evidence from change management data. IEEE Transactions on Software Engineering 27(1) 1\u201312.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"9219_CR27","first-page":"27","volume":"1","author":"E. Tschirner","year":"2004","unstructured":"Tschirner, E. 2004 Breadth of vocabulary and advanced english study: An empirical investigation. Electronic Journal of Foreign Language Teaching 1(1) 27\u201339.","journal-title":"Electronic Journal of Foreign Language Teaching"},{"issue":"11","key":"9219_CR28","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"G.A. Miller","year":"1995","unstructured":"Miller, G.A. 1995 Wordnet: a lexical database for english. Commun. ACM 38(11) 39\u201341.","journal-title":"Commun. ACM"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-006-9219-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-006-9219-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-006-9219-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T10:43:36Z","timestamp":1587120216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-006-9219-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["9219"],"URL":"https:\/\/doi.org\/10.1007\/s11219-006-9219-1","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9]]}}}