{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:26:56Z","timestamp":1768350416184,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/wcre.2013.6671289","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T22:00:42Z","timestamp":1386108042000},"page":"142-151","source":"Crossref","is-referenced-by-count":67,"title":["What help do developers seek, when and how?"],"prefix":"10.1109","author":[{"given":"Hongwei","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Wenyun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384665"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2380296.2380342"},{"key":"18","author":"miles","year":"1994","journal-title":"Qualitative Data Analysis An Expanded Sourcebook"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.45"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(87)90032-X"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306387"},{"key":"14","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/1081706.1081744","article-title":"Strathcona example recommendation tool","author":"holmes","year":"2005","journal-title":"ESEC\/FSE-13"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384684"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(00)00011-X"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240479"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227205"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/BF03173093"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(98)10055-9"},{"key":"24","author":"strauss","year":"1990","journal-title":"Basics of Qualitative Research Grounded Theory Procedures and Techniques"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(79)90018-9"},{"key":"26","author":"tenopir","year":"2004","journal-title":"Communication Patterns of Engineers"},{"key":"27","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-0-387-09684-1_21","article-title":"Archetypal internet-scale source code searching","volume":"275","author":"umarji","year":"2008","journal-title":"Open Source Development Communities and Quality"},{"key":"28","author":"van someren","year":"1994","journal-title":"The Think Aloud Method A Practical Guide to Modelling Cognitive Processes"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080788"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753402"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RSSE.2012.6233404"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.2307\/1167146"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543073003277"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606622"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/smr.567"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.32"},{"key":"5","year":"0","journal-title":"Cloud9 IDE"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(99)00030-5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.1.40"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504201181"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2430545.2430551"}],"event":{"name":"2013 20th Working Conference on Reverse Engineering (WCRE)","location":"Koblenz, Germany","start":{"date-parts":[[2013,10,14]]},"end":{"date-parts":[[2013,10,17]]}},"container-title":["2013 20th Working Conference on Reverse Engineering (WCRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6656028\/6671267\/06671289.pdf?arnumber=6671289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:35:27Z","timestamp":1498102527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6671289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wcre.2013.6671289","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}