{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:22:24Z","timestamp":1730258544489,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/icsm.2015.7332451","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:11Z","timestamp":1448318651000},"page":"51-60","source":"Crossref","is-referenced-by-count":7,"title":["Developing a model of loop actions by mining loop characteristics from a large code corpus"],"prefix":"10.1109","author":[{"given":"Xiaoran","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lori","family":"Pollock","sequence":"additional","affiliation":[]},{"given":"K.","family":"Vijay-Shanker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635901"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568250"},{"key":"ref31","first-page":"318","article-title":"Mapo: Mining and recommending api usage patterns","author":"zhong","year":"2009","journal-title":"Proceedings of the 23rd European Conference on ECOOP"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287632"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref36","first-page":"109","article-title":"A language independent approach for detecting duplicated code","author":"ducasse","year":"1999","journal-title":"Proceedings of International Conference on Software Maintenance (ICSM)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/smr.327"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.15"},{"journal-title":"Code Complete Second Edition","year":"2004","author":"mcconnell","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/66068.66073"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-2166(00)00068-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070533"},{"journal-title":"WordNet","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624052"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_15"},{"key":"ref18","first-page":"143","article-title":"The effects of comments and identifier names on program comprehensibility: an experimental investigation","volume":"4","author":"takang","year":"1996","journal-title":"Journal of Program Languages"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/32.6171"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227140"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985808"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595767"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953323"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972748"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568247"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1085313.1085331"},{"year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342234"},{"year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070524"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083151"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613830"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"}],"event":{"name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2015,9,29]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,10,1]]}},"container-title":["2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321954\/7332440\/07332451.pdf?arnumber=7332451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:09:36Z","timestamp":1490393376000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icsm.2015.7332451","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}