{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T21:01:17Z","timestamp":1776373277059,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2597073.2597077","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"102-111","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":187,"title":["Mining StackOverflow to turn the IDE into a self-confident programming prompter"],"prefix":"10.1145","author":[{"given":"Luca","family":"Ponzanelli","sequence":"first","affiliation":[{"name":"University of Lugano, Switzerland"}]},{"given":"Gabriele","family":"Bavota","sequence":"additional","affiliation":[{"name":"University of Sannio, Italy"}]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[{"name":"University of Sannio, Italy"}]},{"given":"Rocco","family":"Oliveto","sequence":"additional","affiliation":[{"name":"University of Molise, Italy"}]},{"given":"Michele","family":"Lanza","sequence":"additional","affiliation":[{"name":"University of Lugano, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337268"},{"key":"e_1_3_2_1_3_1","volume-title":"Modern Information Retrieval","author":"Baeza-Yates R.","year":"1999","unstructured":"R. Baeza-Yates and B. Ribeiro-Neto . Modern Information Retrieval . Addison-Wesley , 1999 . R. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. Addison-Wesley, 1999."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069489"},{"key":"e_1_3_2_1_5_1","volume-title":"Randomization Tests. Marcel Decker","author":"Baker R. D.","year":"1995","unstructured":"R. D. Baker . Modern permutation test software . In Randomization Tests. Marcel Decker , 1995 . R. D. Baker. Modern permutation test software. In Randomization Tests. Marcel Decker, 1995."},{"key":"e_1_3_2_1_6_1","volume-title":"Yourdon","author":"Constantine L.","year":"1995","unstructured":"L. Constantine . Constantine on Peopleware . Yourdon , 1995 . L. Constantine. Constantine on Peopleware. Yourdon, 1995."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RSSE.2012.6233418"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/129837"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776866"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.04.003"},{"key":"e_1_3_2_1_11_1","volume-title":"Lawrence Associates","author":"Grissom R. J.","year":"2005","unstructured":"R. J. Grissom and J. J. Kim . E ffect sizes for research: A broad practical approach . Lawrence Associates , 2005 . R. J. Grissom and J. J. Kim. E ffect sizes for research: A broad practical approach. Lawrence Associates, 2005."},{"issue":"2","key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/00031305.1998.10480559","article-title":"Violin plots: A box plot-density trace synergism","volume":"52","author":"Hintze J. L.","year":"1998","unstructured":"J. L. Hintze and R. D. Nelson . Violin plots: A box plot-density trace synergism . The American Statistician , 52 ( 2 ): 181 \u2013 184 , 1998 . J. L. Hintze and R. D. Nelson. Violin plots: A box plot-density trace synergism. The American Statistician, 52(2):181\u2013184, 1998.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_13_1","first-page":"65","article-title":"A simple sequentially rejective Bonferroni test procedure","volume":"6","author":"Holm S.","year":"1979","unstructured":"S. Holm . A simple sequentially rejective Bonferroni test procedure . Scandinavian Journal of Statistics , 6 : 65 \u2013 70 , 1979 . S. Holm. A simple sequentially rejective Bonferroni test procedure. Scandinavian Journal of Statistics, 6:65\u201370, 1979.","journal-title":"Scandinavian Journal of Statistics"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370755"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.117"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081744"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181777"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.45"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2012.6344497"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134355"},{"key":"e_1_3_2_1_21_1","volume-title":"Binary codes capable of correcting deletions, insertions, and reversals. Cybernetics and Control Theory, (10):707\u2013710","author":"Levenshtein V. I.","year":"1966","unstructured":"V. I. Levenshtein . Binary codes capable of correcting deletions, insertions, and reversals. Cybernetics and Control Theory, (10):707\u2013710 , 1966 . V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Cybernetics and Control Theory, (10):707\u2013710, 1966."},{"key":"e_1_3_2_1_22_1","volume-title":"In Proceedings of NIPS 2007","author":"Linstead E.","year":"2007","unstructured":"E. Linstead , P. Rigor , S. Bajracharya , C. Lopes , and P. Baldi . Mining internet-scale software repositories . In In Proceedings of NIPS 2007 . MIT Press , 2007 . E. Linstead, P. Rigor, S. Bajracharya, C. Lopes, and P. Baldi. Mining internet-scale software repositories. In In Proceedings of NIPS 2007. MIT Press, 2007."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979366"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1394399"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.84"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985809"},{"key":"e_1_3_2_1_27_1","volume-title":"Questionnaire Design, Interviewing and Attitude Measurement","author":"Oppenheim A. N.","year":"1992","unstructured":"A. N. Oppenheim . Questionnaire Design, Interviewing and Attitude Measurement . Pinter , London , 1992 . A. N. Oppenheim. Questionnaire Design, Interviewing and Attitude Measurement. Pinter, London, 1992."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.16"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747170"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062491"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070525"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486897"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.161"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1984708.1984722"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063239.2063243"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2006.32"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985429.1985434"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297946"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321663"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.43"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09684-1_21"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/794193.794899"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999460"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the 11th Working Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597073.2597077","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2597073.2597077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:03Z","timestamp":1750229763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597073.2597077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":43,"alternative-id":["10.1145\/2597073.2597077","10.1145\/2597073"],"URL":"https:\/\/doi.org\/10.1145\/2597073.2597077","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}