{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T18:54:54Z","timestamp":1773600894988,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,10]],"date-time":"2008-05-10T00:00:00Z","timestamp":1210377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,10]]},"DOI":"10.1145\/1370175.1370226","type":"proceedings-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T14:36:48Z","timestamp":1210862208000},"page":"1015-1018","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Developing natural language-based program analyses and tools to expedite software maintenance"],"prefix":"10.1145","author":[{"given":"Emily","family":"Hill","sequence":"first","affiliation":[{"name":"University of Delaware, Newark, DE, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/553876"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.30731"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257679"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1976.1674590"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/832306.837072"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-9219-1"},{"key":"e_1_3_2_1_9_1","volume-title":"Online","author":"Eaddy M.","year":"2008","unstructured":"M. Eaddy. ConcernTagger case study data. Online, 2008. http:\/\/www1.cs.columbia.edu\/ eaddy\/concerntagger\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.42"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/6294.846201"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/160688.160720"},{"key":"e_1_3_2_1_13_1","volume-title":"Online","author":"P. Group","year":"2008","unstructured":"P. Group. PROMISE data repository. Online, 2008. http:\/\/promisedata.org\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321637"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062492"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203936399"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 18th Annual Psychology of Programming Workshop","author":"Liblit B.","year":"2006","unstructured":"B. Liblit, A. Begel, and E. Sweeser. Cognitive perspectives on the role of naming in computer programs. In Proceedings of the 18th Annual Psychology of Programming Workshop, 2006."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.105"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.17"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3106091.3106097"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081711"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581390"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189748.1189751"},{"key":"e_1_3_2_1_27_1","unstructured":"M. P. Robillard D. Shepherd E. Hill K. Vijay-Shanker and L. Pollock. An empirical study of the concept assignment problem. Technical Report SOCS-TR-2007.3 School of Computer Science McGill University June 2007. http:\/\/www.cs.mcgill.ca\/ martin\/concerns\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287629"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 5th International Symposium on Empirical Software Engineering","volume":"20","author":"Schr\u00f6ter A.","year":"2006","unstructured":"A. Schr\u00f6ter, T. Zimmermann, R. Premraj, and A. Zeller. If your bug database could talk\\dots. In Proceedings of the 5th International Symposium on Empirical Software Engineering, Volume II: Short Papers and Posters, pages 18--20, September 2006. Available at http:\/\/www.st.cs.uni--sb.de\/softevo\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218563.1218587"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2006.40"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294276"},{"issue":"3","key":"e_1_3_2_1_33_1","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip F.","year":"1995","unstructured":"F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3):121--189, 1995.","journal-title":"Journal of Programming Languages"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2003.10.003"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360070105"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_26"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1050849.1050865"}],"event":{"name":"ICSE '08: International Conference on Software Engineering","location":"Leipzig Germany","acronym":"ICSE '08","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","ACM Association for Computing Machinery"]},"container-title":["Companion Proceedings of the 30th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1370175.1370226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1370175.1370226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T18:29:37Z","timestamp":1773599377000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1370175.1370226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,10]]},"references-count":37,"alternative-id":["10.1145\/1370175.1370226","10.1145\/1370175"],"URL":"https:\/\/doi.org\/10.1145\/1370175.1370226","relation":{},"subject":[],"published":{"date-parts":[[2008,5,10]]},"assertion":[{"value":"2008-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}