{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:47Z","timestamp":1750306667811,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T00:00:00Z","timestamp":1401753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,3]]},"DOI":"10.1145\/2593801.2593805","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Supporting comprehension of unfamiliar programs by modeling an expert's perception"],"prefix":"10.1145","author":[{"given":"Naveen","family":"Kulkarni","sequence":"first","affiliation":[{"name":"IIIT Hyderabad, India"}]},{"given":"Vasudeva","family":"Varma","sequence":"additional","affiliation":[{"name":"IIIT Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2014,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080816"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.282.0294"},{"key":"e_1_3_2_1_3_1","volume-title":"14th Workshop of the Psychology of Programming Interest Group (PPIG)","author":"Crosby M. E.","year":"2002","unstructured":"M. E. Crosby , J. Scholtz , and S. Wiedenbeck . The roles beacons play in comprehension for novice and expert programmers. In Programmers , 14th Workshop of the Psychology of Programming Interest Group (PPIG) , Brunel University, pages 58\u201373 , 2002 . M. E. Crosby, J. Scholtz, and S. Wiedenbeck. The roles beacons play in comprehension for novice and expert programmers. In Programmers, 14th Workshop of the Psychology of Programming Interest Group (PPIG), Brunel University, pages 58\u201373, 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.71"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-9219-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810335"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.45"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","first-page":"303","volume-title":"Formal Concept Analysis (FCA)","author":"Hesse W.","year":"2005","unstructured":"W. Hesse and T. Tilley . Formal concept analysis used for software analysis and modelling . In Formal Concept Analysis (FCA) , volume 3626 of Lecture Notes in Computer Science , pages 288\u2013 303 , 2005 . W. Hesse and T. Tilley. Formal concept analysis used for software analysis and modelling. In Formal Concept Analysis (FCA), volume 3626 of Lecture Notes in Computer Science, pages 288\u2013303, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.10.041"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.116"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287675"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134355"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357261"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613830"},{"key":"e_1_3_2_1_15_1","first-page":"152","volume-title":"The North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HTL)","author":"Nenkova A.","year":"2004","unstructured":"A. Nenkova and R. J. Passonneau . Evaluating content selection in summarization: The pyramid method . In The North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HTL) , pages 145\u2013 152 , 2004 . A. Nenkova and R. J. Passonneau. Evaluating content selection in summarization: The pyramid method. In The North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HTL), pages 145\u2013152, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/258549.258558"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080777"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.101"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985808"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593801.2593805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2593801.2593805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:45Z","timestamp":1750230045000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593801.2593805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,3]]},"references-count":19,"alternative-id":["10.1145\/2593801.2593805","10.1145\/2593801"],"URL":"https:\/\/doi.org\/10.1145\/2593801.2593805","relation":{},"subject":[],"published":{"date-parts":[[2014,6,3]]},"assertion":[{"value":"2014-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}