{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T16:45:43Z","timestamp":1748018743014},"reference-count":37,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2000,9,1]],"date-time":"2000-09-01T00:00:00Z","timestamp":967766400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2000,9]]},"DOI":"10.1016\/s0164-1212(00)00023-6","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T02:09:52Z","timestamp":1049508592000},"page":"17-28","source":"Crossref","is-referenced-by-count":11,"title":["An empirical analysis of debugging performance \u2013 differences between iterative and recursive constructs"],"prefix":"10.1016","volume":"54","author":[{"given":"A.C","family":"Benander","sequence":"first","affiliation":[]},{"given":"B.A","family":"Benander","sequence":"additional","affiliation":[]},{"given":"Janche","family":"Sang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(00)00023-6_BIB1","doi-asserted-by":"crossref","unstructured":"Agrawal, H., DeMillo, R.A., Spafford, E.H., 1991. An execution-backtracking approach to debugging. IEEE Software May, 21\u201328","DOI":"10.1109\/52.88940"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB2","unstructured":"Anderson, J.R., 1976. Language, Memory, and Thought. Lawrence Erlbaum Associates, Hillsdale, NJ"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB3","unstructured":"Anderson, J. R., Pirolli, P., Farrell, R., 1998. Learning to program recursive functions. In: M.T.H. Chi, R. Glaser, M. Farr, (Eds.), The Nature of Expertise. Lawrence Erlbaum Associates, Hillsdale, NJ"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB4","doi-asserted-by":"crossref","unstructured":"Atwood, M.E., Ramsey, H.R., 1978. Cognitive structures in the comprehension and memory of computer programs: an investigation of computer program debugging. NTIS, AD_A0605522\/0","DOI":"10.21236\/ADA060522"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB5","doi-asserted-by":"crossref","unstructured":"Benander, A.C., Benander, B.A., 1989. An empirical analysis of debugging techniques. Journal of Research on Computing in Education Summer, 447\u2013455","DOI":"10.1080\/08886504.1989.10781893"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB6","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0164-1212(95)00043-7","article-title":"Recursion vs iteration: an empirical study of comprehension","volume":"32","author":"Benander","year":"1996","journal-title":"Journal of Systems Software"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB7","unstructured":"Bentley, J., 1998. The cost of recursion. Dr. Dobb\u2019s Journal, June, 111\u2013113"},{"issue":"1","key":"10.1016\/S0164-1212(00)00023-6_BIB8","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/988284.988286","article-title":"The coroutines of Hanoi","volume":"20","author":"Birtwistle","year":"1985","journal-title":"SIGPLAN Notices"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB9","series-title":"The Mythical Man-Month","author":"Brooks","year":"1995"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB10","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","article-title":"Towards a theory of comprehension of computer programs","volume":"18","author":"Brooks","year":"1983","journal-title":"International Journal of Man\u2013Machine Studies"},{"issue":"4","key":"10.1016\/S0164-1212(00)00023-6_BIB11","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/248448.248460","article-title":"Fostering debugging communities on the web","volume":"40","author":"Domingue","year":"1997","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.1016\/S0164-1212(00)00023-6_BIB12","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/248448.248456","article-title":"My hairiest bug war stories","volume":"40","author":"Eisenstadt","year":"1997","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.1016\/S0164-1212(00)00023-6_BIB13","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/248448.248459","article-title":"Programming on an already full brain","volume":"40","author":"Fry","year":"1997","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.1016\/S0164-1212(00)00023-6_BIB14","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/32.44385","article-title":"Debugging effort estimation using software metrics","volume":"16","author":"Gorla","year":"1990","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB15","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/S0020-7373(75)80005-8","article-title":"Some psychological evidence on how people debug computer programs","volume":"7","author":"Gould","year":"1975","journal-title":"International Journal of Man\u2013Machine Studies"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB16","series-title":"A Discipline for Software Engineering","author":"Humphrey","year":"1995"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB17","unstructured":"Jeffries, R., 1981. Computer program debugging by experts. In: Psychonomics Society Meetings, November 1981"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB18","unstructured":"Jeffries, R., 1982. A comparison of the debugging behavior of expert and novice programmers. In: AERA Annual Meeting, March 1982"},{"issue":"4","key":"10.1016\/S0164-1212(00)00023-6_BIB19","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1207\/s15327051hci0304_2","article-title":"Debugging: an analysis of bug-location strategies","volume":"3","author":"Katz","year":"1988","journal-title":"Human Computer Interaction"},{"issue":"7","key":"10.1016\/S0164-1212(00)00023-6_BIB20","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1002\/spe.4380190702","article-title":"The errors of TEX","volume":"19","author":"Knuth","year":"1989","journal-title":"Software Practice and Experience"},{"issue":"4","key":"10.1016\/S0164-1212(00)00023-6_BIB21","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/248448.248455","article-title":"Introduction to the debugging scandal","volume":"40","author":"Lieberman","year":"1997","journal-title":"Communications of the ACM"},{"issue":"8","key":"10.1016\/S0164-1212(00)00023-6_BIB22","first-page":"31","article-title":"Response to reader\u2019s comments on the debugging scandal","volume":"40","author":"Lieberman","year":"1997","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB23","series-title":"Recursive Algorithms","author":"Lorentz","year":"1994"},{"issue":"2","key":"10.1016\/S0164-1212(00)00023-6_BIB24","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/948566.948573","article-title":"Towers of hanoi revisited: a nonrecursive surprise","volume":"19","author":"Mayer","year":"1984","journal-title":"SIGPLAN Notices"},{"issue":"5","key":"10.1016\/S0164-1212(00)00023-6_BIB25","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/988327.988330","article-title":"Solution of the towers of Hanoi problem using a binary tree","volume":"20","author":"Maziar","year":"1985","journal-title":"SIGPLAN Notices"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/7885.315712","article-title":"Ruminations on computer science curricula","volume":"30","author":"McCracken","year":"1987","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB27","unstructured":"Nanja, M., Cook, C.R., 1987. An analysis of the on-line debugging process. In: Empirical Studies of Programmers: Second Workshop, Ablex, Norwood, NJ, pp. 172\u2013184"},{"issue":"2","key":"10.1016\/S0164-1212(00)00023-6_BIB28","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1037\/h0080061","article-title":"The role of learning from examples in the acquisition of recursive programming skills","volume":"39","author":"Pirolli","year":"1985","journal-title":"Canadian Journal of Psychology"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB29","series-title":"Thinking Recursively","author":"Roberts","year":"1986"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB30","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/BF00891962","article-title":"Empirical studies of functional programming learners evaluating recursive functions","volume":"22","author":"Segal","year":"1995","journal-title":"Instructional Science"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB31","doi-asserted-by":"crossref","unstructured":"Shimomura, T., Isoda, S., 1991. Linked-list visualization for debugging. IEEE Software, May 1991, 44\u201351","DOI":"10.1109\/52.88943"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB32","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1109\/32.135770","article-title":"Cognitive fit: an empirical study of recursion and iteration","volume":"18","author":"Sinha","year":"1992","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"10.1016\/S0164-1212(00)00023-6_BIB33","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/248448.248457","article-title":"Debugging and the experience of immediacy","volume":"40","author":"Ungar","year":"1997","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB34","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0020-7373(89)80019-7","article-title":"Toward a theory of computer program bugs: an empirical test","volume":"30","author":"Vessey","year":"1989","journal-title":"International Journal of Man\u2013Machine Studies"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0020-7373(89)80018-5","article-title":"Learning recursion and iteration from examples","volume":"30","author":"Wiedenbeck","year":"1989","journal-title":"International Journal of Man\u2013Machine Studies"},{"key":"10.1016\/S0164-1212(00)00023-6_BIB36","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/S0020-7373(05)80090-2","article-title":"The initial stage of program comprehension","volume":"35","author":"Wiedenbeck","year":"1991","journal-title":"International Journal of Man\u2013Machine Studies"},{"issue":"9","key":"10.1016\/S0164-1212(00)00023-6_BIB37","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1002\/spe.4380250904","article-title":"On tuning recursive procedures","volume":"25","author":"Yehudai","year":"1995","journal-title":"Software Practice and Experience"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000236?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000236?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T12:07:29Z","timestamp":1578744449000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121200000236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,9]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2000,9]]}},"alternative-id":["S0164121200000236"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(00)00023-6","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2000,9]]}}}