{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T20:29:22Z","timestamp":1771273762249,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/saner.2017.7884623","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T03:11:58Z","timestamp":1490325118000},"page":"217-227","source":"Crossref","is-referenced-by-count":59,"title":["Shorter identifier names take longer to comprehend"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Hofmeister","sequence":"first","affiliation":[]},{"given":"Janet","family":"Siegmund","sequence":"additional","affiliation":[]},{"given":"Daniel V.","family":"Holt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref32","author":"wickens","year":"2004","journal-title":"Design and Analysis A Researcher's Handbook"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/BF03395630","article-title":"Effective Analysis of Reaction Time Data","volume":"58","author":"whelan","year":"2008","journal-title":"The Psychological Record"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/713755710"},{"key":"ref10","author":"cohen","year":"1988","journal-title":"Statistical Power Analysis for the Behavioral Sciences"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.82.6.407"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.108.1.204"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X01003922"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-9219-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(97)00095-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195497"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.51"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-007-0031-2"},{"key":"ref19","author":"leonhart","year":"2009","journal-title":"Lehrbuch Statistik Einstieg und Vertiefung"},{"key":"ref28","first-page":"68","article-title":"Wortverarbeitung","author":"spalek","year":"2010","journal-title":"Psycholinguistik"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(75)80045-4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010283"},{"key":"ref3","first-page":"1","article-title":"Assessing the Relevance of Identifier Names in a Legacy Software System","author":"anquetil","year":"1998","journal-title":"Conf Centre for Advanced Studies on Collaborative Research CASCON '98"},{"key":"ref6","first-page":"158","article-title":"To Camel Case or under_score","author":"binkley","year":"2009","journal-title":"Proc Int Conf on Program Compr (ICPC)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/2.675631"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0749-596X(85)90017-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.70"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(83)80031-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4000-6"},{"key":"ref9","first-page":"1040","article-title":"A Family of Experiments to Assess the Effectiveness and Efficiency of Source Code Obfuscation Techniques","volume":"19","author":"ceccato","year":"2014","journal-title":"Empirical Softw Eng"},{"key":"ref1","year":"0","journal-title":"Class Naming Guidelines"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.101.2.343"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.3.510"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985454"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503707"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1037\/h0027768"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1996.558901"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.41"}],"event":{"name":"2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"Klagenfurt, Austria","start":{"date-parts":[[2017,2,20]]},"end":{"date-parts":[[2017,2,24]]}},"container-title":["2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7879528\/7884596\/07884623.pdf?arnumber=7884623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:23:19Z","timestamp":1568938999000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7884623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/saner.2017.7884623","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}