{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:03:54Z","timestamp":1775016234993,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T00:00:00Z","timestamp":1415664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,11]]},"DOI":"10.1145\/2635868.2635883","type":"proceedings-article","created":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T21:44:36Z","timestamp":1415137476000},"page":"281-293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":269,"title":["Learning natural coding conventions"],"prefix":"10.1145","author":[{"given":"Miltiadis","family":"Allamanis","sequence":"first","affiliation":[{"name":"University of Edinburgh, UK"}]},{"given":"Earl T.","family":"Barr","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Christian","family":"Bird","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Charles","family":"Sutton","sequence":"additional","affiliation":[{"name":"University of Edinburgh, UK"}]}],"member":"320","published-online":{"date-parts":[[2014,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.18"},{"key":"e_1_3_2_1_2_1","volume-title":"Guide to the Software Engineering Body of Knowledge - SWEBOK","author":"Abran A.","year":"2004","unstructured":"A. Abran , P. Bourque , R. Dupuis , J. W. Moore , and L. L. Tripp . Guide to the Software Engineering Body of Knowledge - SWEBOK . IEEE Press , Piscataway, NJ, USA , 2004 version edition, 2004. A. Abran, P. Bourque, R. Dupuis, J. W. Moore, and L. L. Tripp. Guide to the Software Engineering Body of Knowledge - SWEBOK. IEEE Press, Piscataway, NJ, USA, 2004 version edition, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.281.0002"},{"key":"e_1_3_2_1_4_1","first-page":"216","volume-title":"Proceedings of the Tenth International Workshop on Mining Software Repositories","author":"Allamanis M.","unstructured":"M. Allamanis and C. Sutton . Mining source code repositories at massive scale using language modeling . In Proceedings of the Tenth International Workshop on Mining Software Repositories , pages 207\u2013 216 . IEEE Press, 2013. M. Allamanis and C. Sutton. Mining source code repositories at massive scale using language modeling. In Proceedings of the Tenth International Workshop on Mining Software Repositories, pages 207\u2013216. IEEE Press, 2013."},{"key":"e_1_3_2_1_5_1","first-page":"4","volume-title":"Proceedings of the 1998 Conference of the Centre for Advanced Studies on Collaborative Research","author":"Anquetil N.","year":"1998","unstructured":"N. Anquetil and T. Lethbridge . Assessing the relevance of identifier names in a legacy software system . In Proceedings of the 1998 Conference of the Centre for Advanced Studies on Collaborative Research , page 4 , 1998 . N. Anquetil and T. Lethbridge. Assessing the relevance of identifier names in a legacy software system. In Proceedings of the 1998 Conference of the Centre for Advanced Studies on Collaborative Research, page 4, 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199905\/06)11:3%3C201::AID-SMR192%3E3.0.CO;2-1"},{"key":"e_1_3_2_1_7_1","volume-title":"Apple\u2019s SSL iPhone vulnerability: How did it happen, and what next? bit.ly\/1bJ7aSa","author":"Arthur C.","year":"2014","unstructured":"C. Arthur . Apple\u2019s SSL iPhone vulnerability: How did it happen, and what next? bit.ly\/1bJ7aSa , 2014 . Visited Mar 2014. C. Arthur. Apple\u2019s SSL iPhone vulnerability: How did it happen, and what next? bit.ly\/1bJ7aSa, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Association et al. MISRA-C 2012: Guidelines for the Use of the C Language in Critical Systems. ISBN 9781906400118","author":"M. I. S.","year":"2012","unstructured":"M. I. S. R. Association et al. MISRA-C 2012: Guidelines for the Use of the C Language in Critical Systems. ISBN 9781906400118 , 2012 . M. I. S. R. Association et al. MISRA-C 2012: Guidelines for the Use of the C Language in Critical Systems. ISBN 9781906400118, 2012."},{"key":"e_1_3_2_1_9_1","unstructured":"astyle Contributors. Artistic style 2.03. http:\/\/astyle.sourceforge.net\/ 2013. Visited September 9 2013.  astyle Contributors. Artistic style 2.03. http:\/\/astyle.sourceforge.net\/ 2013. Visited September 9 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486882"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_2_1_12_1","first-page":"498","volume-title":"Proceedings of the 15th International Conference on Software Engineering","author":"Biggerstaff T. J.","unstructured":"T. J. Biggerstaff , B. G. Mitbander , and D. Webster . The concept assignment problem in program understanding . In Proceedings of the 15th International Conference on Software Engineering , pages 482\u2013 498 . IEEE Computer Society Press, 1993. T. J. Biggerstaff, B. G. Mitbander, and D. Webster. The concept assignment problem in program understanding. In Proceedings of the 15th International Conference on Software Engineering, pages 482\u2013498. IEEE Computer Society Press, 1993."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9201-4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090039"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658076"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"F. P. Brooks. The Mythical Man-Month. Addison-Wesley Reading 1975.   F. P. Brooks. The Mythical Man-Month. Addison-Wesley Reading 1975.","DOI":"10.1145\/800027.808439"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. 3rd World Congress for Software Quality (3WCSQ)","author":"Broy M.","year":"2005","unstructured":"M. Broy , F. Dei\u00dfenb\u00f6ck , and M. Pizka . A holistic approach to software quality at work . In Proc. 3rd World Congress for Software Quality (3WCSQ) , 2005 . M. Broy, F. Dei\u00dfenb\u00f6ck, and M. Pizka. A holistic approach to software quality at work. In Proc. 3rd World Congress for Software Quality (3WCSQ), 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595728"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.70"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/850948.853439"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/230386.230390"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3115\/981863.981904"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X01003922"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.14"},{"key":"e_1_3_2_1_25_1","volume-title":"Statistics for Research","author":"Dowdy S.","year":"2011","unstructured":"S. Dowdy , S. Wearden , and D. Chilko . Statistics for Research , volume 512 . John Wiley & Sons , 2011 . S. Dowdy, S. Wearden, and D. Chilko. Statistics for Research, volume 512. John Wiley & Sons, 2011."},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/www.eclipse.org\/jdt\/","author":"JDT.","year":"2013","unstructured":"Eclipse-Contributors. Eclipse JDT. http:\/\/www.eclipse.org\/jdt\/ , 2013 . Visited September 9, 2013. Eclipse-Contributors. Eclipse JDT. http:\/\/www.eclipse.org\/jdt\/, 2013. Visited September 9, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985449"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882315"},{"key":"e_1_3_2_1_30_1","volume-title":"JUnit Pull Request #834. bit.ly\/O8bmjM","year":"2014","unstructured":"GitHub. JUnit Pull Request #834. bit.ly\/O8bmjM , 2014 . Visited Mar 2014. GitHub. JUnit Pull Request #834. bit.ly\/O8bmjM, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_31_1","volume-title":"libgdx Pull Request #1400. bit.ly\/O8aBqV","year":"2014","unstructured":"GitHub. libgdx Pull Request #1400. bit.ly\/O8aBqV , 2014 . Visited Mar 2014. GitHub. libgdx Pull Request #1400. bit.ly\/O8aBqV, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_32_1","unstructured":"gnu-indent Contributors. GNU Indent \u2013 beautify C code. http:\/\/www.gnu.org\/software\/indent\/ 2013. Visited September 9 2013.  gnu-indent Contributors. GNU Indent \u2013 beautify C code. http:\/\/www.gnu.org\/software\/indent\/ 2013. Visited September 9 2013."},{"key":"e_1_3_2_1_33_1","first-page":"12","volume-title":"International Conference on Program Comprehension","author":"Gupta S.","unstructured":"S. Gupta , S. Malik , L. Pollock , and K. Vijay-Shanker . Part-of-speech tagging of program identifiers for improved text-based software engineering tools . In International Conference on Program Comprehension , pages 3\u2013 12 . IEEE, 2013. S. Gupta, S. Malik, L. Pollock, and K. Vijay-Shanker. Part-of-speech tagging of program identifiers for improved text-based software engineering tools. In International Conference on Program Comprehension, pages 3\u201312. IEEE, 2013."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2003.09.016"},{"key":"e_1_3_2_1_35_1","first-page":"847","volume-title":"International Conference on Software Engineering (ICSE)","author":"Hindle A.","unstructured":"A. Hindle , E. T. Barr , Z. Su , M. Gabel , and P. Devanbu . On the naturalness of software . In International Conference on Software Engineering (ICSE) , pages 837\u2013 847 . IEEE, 2012. A. Hindle, E. T. Barr, Z. Su, M. Gabel, and P. Devanbu. On the naturalness of software. In International Conference on Software Engineering (ICSE), pages 837\u2013847. IEEE, 2012."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.005"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_14"},{"key":"e_1_3_2_1_38_1","volume-title":"Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition","author":"Jurafsky D.","year":"2009","unstructured":"D. Jurafsky and J. H. Martin . Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition . Prentice Hall , 2 nd edition, 2009 . D. Jurafsky and J. H. Martin. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition. Prentice Hall, 2nd edition, 2009.","edition":"2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/146370.146380"},{"key":"e_1_3_2_1_40_1","volume-title":"bit.ly\/MMvx6b","author":"Langley A.","year":"2014","unstructured":"A. Langley . Apple\u2019s SSL\/ TLS bug. bit.ly\/MMvx6b , 2014 . Visited Mar 2014. A. Langley. Apple\u2019s SSL\/TLS bug. bit.ly\/MMvx6b, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.31"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v19:4"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.51"},{"key":"e_1_3_2_1_44_1","volume-title":"Annual Psychology of Programming Workshop","author":"Liblit B.","year":"2006","unstructured":"B. Liblit , A. Begel , and E. Sweetser . Cognitive perspectives on the role of naming in computer programs . In Annual Psychology of Programming Workshop , 2006 . B. Liblit, A. Begel, and E. Sweetser. Cognitive perspectives on the role of naming in computer programs. In Annual Psychology of Programming Workshop, 2006."},{"key":"e_1_3_2_1_45_1","first-page":"81","volume-title":"Text Summarization Branches Out: Proceedings of the ACL-04 Workshop","author":"Lin C.-Y.","year":"2004","unstructured":"C.-Y. Lin . Rouge : A package for automatic evaluation of summaries . In Text Summarization Branches Out: Proceedings of the ACL-04 Workshop , pages 74\u2013 81 , 2004 . C.-Y. Lin. Rouge: A package for automatic evaluation of summaries. In Text Summarization Branches Out: Proceedings of the ACL-04 Workshop, pages 74\u201381, 2004."},{"key":"e_1_3_2_1_46_1","volume-title":"Structured generative models of natural source code. arXiv preprint arXiv:1401.0514","author":"Maddison C. J.","year":"2014","unstructured":"C. J. Maddison and D. Tarlow . Structured generative models of natural source code. arXiv preprint arXiv:1401.0514 , 2014 . C. J. Maddison and D. Tarlow. Structured generative models of natural source code. arXiv preprint arXiv:1401.0514, 2014."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(91)90066-U"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc of the ACL","author":"Movshovitz-Attias D.","year":"2013","unstructured":"D. Movshovitz-Attias and W. W. Cohen . Natural language models for predicting programming comments . In Proc of the ACL , 2013 . D. Movshovitz-Attias and W. W. Cohen. Natural language models for predicting programming comments. In Proc of the ACL, 2013."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.87"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337232"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491458"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083151"},{"key":"e_1_3_2_1_55_1","volume-title":"Code Conventions for the Java Programming Language. http:\/\/www.oracle.com\/technetwork\/ java\/codeconv-138413","year":"1999","unstructured":"Oracle. Code Conventions for the Java Programming Language. http:\/\/www.oracle.com\/technetwork\/ java\/codeconv-138413 .html, 1999 . Visited September 2, 2013. Oracle. Code Conventions for the Java Programming Language. http:\/\/www.oracle.com\/technetwork\/ java\/codeconv-138413.html, 1999. Visited September 2, 2013."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"key":"e_1_3_2_1_57_1","unstructured":"R. Pike. Go at Google. http:\/\/talks.golang.org\/2012\/splash.slide 2012. Visited September 9 2013.  R. Pike. Go at Google. http:\/\/talks.golang.org\/2012\/splash.slide 2012. Visited September 9 2013."},{"key":"e_1_3_2_1_58_1","unstructured":"Pylint-Contributors. Pylint \u2013 code analysis for Python. http:\/\/www.pylint.org\/ 2013. Visited September 9 2013.  Pylint-Contributors. Pylint \u2013 code analysis for Python. http:\/\/www.pylint.org\/ 2013. Visited September 9 2013."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.17"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.22"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491444"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.42"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.161"},{"key":"e_1_3_2_1_64_1","unstructured":"G. v. Rossum B. Warsaw and N. Coghlan. PEP 8\u2013Style Guide for Python Code. http:\/\/www.python.org\/dev\/peps\/pep-0008\/ 2013. Visited September 8 2013.  G. v. Rossum B. Warsaw and N. Coghlan. PEP 8\u2013Style Guide for Python Code. http:\/\/www.python.org\/dev\/peps\/pep-0008\/ 2013. Visited September 8 2013."},{"key":"e_1_3_2_1_65_1","unstructured":"C. Simonyi. Hungarian notation. http:\/\/msdn.microsoft. com\/en-us\/library\/aa260976(VS.60).aspx 1999. Visited September 2 2013.  C. Simonyi. Hungarian notation. http:\/\/msdn.microsoft. com\/en-us\/library\/aa260976(VS.60).aspx 1999. Visited September 2 2013."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010283"},{"key":"e_1_3_2_1_67_1","volume-title":"The Elements of Style","author":"Strunk W.","year":"1979","unstructured":"W. Strunk Jr and E. White . The Elements of Style . Macmillan , New York , 3 rd edition, 1979 . W. Strunk Jr and E. White. The Elements of Style. Macmillan, New York, 3rd edition, 1979.","edition":"3"},{"issue":"3","key":"e_1_3_2_1_68_1","first-page":"143","article-title":"The effects of comments and identifier names on program comprehensibility: an experiential study","volume":"4","author":"Takang A.","year":"1996","unstructured":"A. Takang , P. Grubb , and R. Macredie . The effects of comments and identifier names on program comprehensibility: an experiential study . Journal of Program Languages , 4 ( 3 ): 143 \u2013 167 , 1996 . A. Takang, P. Grubb, and R. Macredie. The effects of comments and identifier names on program comprehensibility: an experiential study. Journal of Program Languages, 4(3):143\u2013167, 1996.","journal-title":"Journal of Program Languages"},{"issue":"3","key":"e_1_3_2_1_69_1","first-page":"143","article-title":"The effects of comments and identifier names on program comprehensibility: an experimental investigation","volume":"4","author":"Takang A. A.","year":"1996","unstructured":"A. A. Takang , P. A. Grubb , and R. D. Macredie . The effects of comments and identifier names on program comprehensibility: an experimental investigation . J. Prog. Lang. , 4 ( 3 ): 143 \u2013 167 , 1996 . A. A. Takang, P. A. Grubb, and R. D. Macredie. The effects of comments and identifier names on program comprehensibility: an experimental investigation. J. Prog. Lang., 4(3):143\u2013167, 1996.","journal-title":"J. Prog. Lang."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100098"},{"key":"e_1_3_2_1_71_1","first-page":"328","volume-title":"Proceedings of the Tenth International Workshop on Mining Software Repositories","author":"Wang J.","unstructured":"J. Wang , Y. Dang , H. Zhang , K. Chen , T. Xie , and D. Zhang . Mining succinct and high-coverage API usage patterns from source code . In Proceedings of the Tenth International Workshop on Mining Software Repositories , pages 319\u2013 328 . IEEE Press, 2013. J. Wang, Y. Dang, H. Zhang, K. Chen, T. Xie, and D. Zhang. Mining succinct and high-coverage API usage patterns from source code. In Proceedings of the Tenth International Workshop on Mining Software Repositories, pages 319\u2013328. IEEE Press, 2013."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.15"},{"key":"e_1_3_2_1_73_1","volume-title":"Coding Conventions. http: \/\/en.wikipedia.org\/wiki\/Coding_conventions.","unstructured":"Wikipedia. Coding Conventions. http: \/\/en.wikipedia.org\/wiki\/Coding_conventions. Wikipedia. Coding Conventions. http: \/\/en.wikipedia.org\/wiki\/Coding_conventions."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.10.2.105"},{"key":"e_1_3_2_1_75_1","first-page":"836","volume-title":"Proceedings of the 34th International Conference on Software Engineering","author":"Zhang C.","unstructured":"C. Zhang , J. Yang , Y. Zhang , J. Fan , X. Zhang , J. Zhao , and P. Ou . Automatic parameter recommendation for practical api usage . In Proceedings of the 34th International Conference on Software Engineering , pages 826\u2013 836 . IEEE Press, 2012. C. Zhang, J. Yang, Y. Zhang, J. Fan, X. Zhang, J. Zhao, and P. Ou. Automatic parameter recommendation for practical api usage. In Proceedings of the 34th International Conference on Software Engineering, pages 826\u2013836. IEEE Press, 2012."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_15"}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2635868.2635883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:44Z","timestamp":1750273424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,11]]},"references-count":75,"alternative-id":["10.1145\/2635868.2635883","10.1145\/2635868"],"URL":"https:\/\/doi.org\/10.1145\/2635868.2635883","relation":{},"subject":[],"published":{"date-parts":[[2014,11,11]]},"assertion":[{"value":"2014-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}