{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:02:44Z","timestamp":1772042564334,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T00:00:00Z","timestamp":1415664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,11]]},"DOI":"10.1145\/2635868.2635901","type":"proceedings-article","created":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T21:44:36Z","timestamp":1415137476000},"page":"472-483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["Mining idioms from source code"],"prefix":"10.1145","author":[{"given":"Miltiadis","family":"Allamanis","sequence":"first","affiliation":[{"name":"University of Edinburgh, UK"}]},{"given":"Charles","family":"Sutton","sequence":"additional","affiliation":[{"name":"University of Edinburgh, UK"}]}],"member":"320","published-online":{"date-parts":[[2014,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287630"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487127"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_3_2_1_4_1","volume-title":"Working Conference on Mining Software Repositories (MSR)","author":"Bacchelli A.","year":"2013","unstructured":"A. Bacchelli . Mining challenge 2013 : StackOverflow . In Working Conference on Mining Software Repositories (MSR) , 2013. A. Bacchelli. Mining challenge 2013: StackOverflow. In Working Conference on Mining Software Repositories (MSR), 2013."},{"key":"e_1_3_2_1_5_1","first-page":"49","volume-title":"Computing Science and Statistics","author":"Baker B. S.","year":"1993","unstructured":"B. S. Baker . A program for identifying duplicated code . Computing Science and Statistics , pages 49\u2013 49 , 1993 . B. S. Baker. A program for identifying duplicated code. Computing Science and Statistics, pages 49\u201349, 1993."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853341"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597102"},{"key":"e_1_3_2_1_9_1","unstructured":"S. Chuan. JavaScript Patterns Collection. http:\/\/shichuan. github.io\/javascript-patterns\/ 2014. Visited Feb 2014.  S. Chuan. JavaScript Patterns Collection. http:\/\/shichuan. github.io\/javascript-patterns\/ 2014. Visited Feb 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953031"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453130"},{"key":"e_1_3_2_1_12_1","volume-title":"eclipse.org\/jdt","author":"Eclipse","year":"2014","unstructured":"Eclipse-Contributors. Eclipse JDT. eclipse.org\/jdt , 2014 . Visited Mar 2014. Eclipse-Contributors. Eclipse JDT. eclipse.org\/jdt, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9073-9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882315"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1201\/b16018"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmp.2011.08.004"},{"key":"e_1_3_2_1_17_1","volume-title":"www.githubarchive.org","author":"Grigorik I.","year":"2014","unstructured":"I. Grigorik . GitHub Archive . www.githubarchive.org , 2014 . Visited Mar 2014. I. Grigorik. GitHub Archive. www.githubarchive.org, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337322"},{"key":"e_1_3_2_1_19_1","volume-title":"Cambridge University Press","author":"Hjort N. L.","year":"2010","unstructured":"N. L. Hjort . Bayesian Nonparametrics . Number 28. Cambridge University Press , 2010 . N. L. Hjort. Bayesian Nonparametrics. Number 28. Cambridge University Press, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.117"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900008.1900143"},{"key":"e_1_3_2_1_22_1","unstructured":"Java Idioms Editors. Java Idioms. http:\/\/c2.com\/ppr\/ wiki\/JavaIdioms\/JavaIdioms.html 2014. Visited Feb 2014.  Java Idioms Editors. Java Idioms. http:\/\/c2.com\/ppr\/ wiki\/JavaIdioms\/JavaIdioms.html 2014. Visited Feb 2014."},{"key":"e_1_3_2_1_23_1","volume-title":"High-speed coding with Custom Live Templates. bit.ly\/1o8R8Do","year":"2014","unstructured":"JetBrains. High-speed coding with Custom Live Templates. bit.ly\/1o8R8Do , 2014 . Visited Mar 2014. JetBrains. High-speed coding with Custom Live Templates. bit.ly\/1o8R8Do, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1890496.1890498"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081737"},{"key":"e_1_3_2_1_29_1","first-page":"108","volume-title":"Reverse Engineering","author":"Kontogiannis K. A.","unstructured":"K. A. Kontogiannis , R. DeMori , E. Merlo , M. Galler , and M. Bernstein . Pattern matching for clone and concept detection . In Reverse Engineering , pages 77\u2013 108 . Springer, 1996. K. A. Kontogiannis, R. DeMori, E. Merlo, M. Galler, and M. Bernstein. Pattern matching for clone and concept detection. In Reverse Engineering, pages 77\u2013108. Springer, 1996."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"e_1_3_2_1_31_1","volume-title":"Large-scale pattern mining of computer program source code. Master\u2019s thesis","author":"Kuzborskij I.","year":"2011","unstructured":"I. Kuzborskij . Large-scale pattern mining of computer program source code. Master\u2019s thesis , University of Edinburgh , 2011 . I. Kuzborskij. Large-scale pattern mining of computer program source code. Master\u2019s thesis, University of Edinburgh, 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_3_2_1_33_1","first-page":"581","volume-title":"Type-based MCMC. In Human Language Technologies: Annual Conference of the North American Chapter of the Association for Computational Linguistics (HLT \/NAACL)","author":"Liang P.","year":"2010","unstructured":"P. Liang , M. I. Jordan , and D. Klein . Type-based MCMC. In Human Language Technologies: Annual Conference of the North American Chapter of the Association for Computational Linguistics (HLT \/NAACL) , pages 573\u2013 581 , 2010 . P. Liang, M. I. Jordan, and D. Klein. Type-based MCMC. In Human Language Technologies: Annual Conference of the North American Chapter of the Association for Computational Linguistics (HLT \/NAACL), pages 573\u2013581, 2010."},{"key":"e_1_3_2_1_34_1","volume-title":"Structured generative models of natural source code. arXiv preprint arXiv:1401.0514","author":"Maddison C. J.","year":"2014","unstructured":"C. J. Maddison and D. Tarlow . Structured generative models of natural source code. arXiv preprint arXiv:1401.0514 , 2014 . C. J. Maddison and D. Tarlow. Structured generative models of natural source code. arXiv preprint arXiv:1401.0514, 2014."},{"key":"e_1_3_2_1_35_1","first-page":"195","volume-title":"International Conference on Machine Learning (ICML)","author":"Menon A.","year":"2013","unstructured":"A. Menon , O. Tamuz , S. Gulwani , B. Lampson , and A. Kalai . A machine learning framework for programming by example . In International Conference on Machine Learning (ICML) , pages 187\u2013 195 , 2013 . A. Menon, O. Tamuz, S. Gulwani, B. Lampson, and A. Kalai. A machine learning framework for programming by example. In International Conference on Machine Learning (ICML), pages 187\u2013195, 2013."},{"key":"e_1_3_2_1_36_1","unstructured":"Microsoft Research. High-speed coding with Custom Live Templates. http:\/\/bit.ly\/1pr2rVG 2014. Visited Mar 2014.  Microsoft Research. High-speed coding with Custom Live Templates. http:\/\/bit.ly\/1pr2rVG 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_37_1","volume-title":"Machine Learning: A Probabilistic Perspective","author":"Murphy K. P.","year":"2012","unstructured":"K. P. Murphy . Machine Learning: A Probabilistic Perspective . MIT Press , 2012 . K. P. Murphy. Machine Learning: A Probabilistic Perspective. MIT Press, 2012."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595767"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491458"},{"key":"e_1_3_2_1_40_1","unstructured":"Oracle. Java SE Documentation: Catching Multiple Exception Types and Rethrowing Exceptions with Improved Type Checking. http:\/\/docs.oracle.com\/javase\/7\/docs\/ technotes\/guides\/language\/catch-multiple.html 2014. Visited Feb 2014.  Oracle. Java SE Documentation: Catching Multiple Exception Types and Rethrowing Exceptions with Improved Type Checking. http:\/\/docs.oracle.com\/javase\/7\/docs\/ technotes\/guides\/language\/catch-multiple.html 2014. Visited Feb 2014."},{"key":"e_1_3_2_1_41_1","volume-title":"Encyclopedia of Machine Learning","author":"Orbanz P.","year":"2010","unstructured":"P. Orbanz and Y. W. Teh . Bayesian nonparametric models . In Encyclopedia of Machine Learning . Springer , 2010 . P. Orbanz and Y. W. Teh. Bayesian nonparametric models. In Encyclopedia of Machine Learning. Springer, 2010."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1667583.1667599"},{"key":"e_1_3_2_1_43_1","volume-title":"wiki.eclipse.org\/Recommenders\/Snipmatch","author":"Recommenders-Contributors E.","year":"2014","unstructured":"E. Recommenders-Contributors . Eclipse SnipMatch . wiki.eclipse.org\/Recommenders\/Snipmatch , 2014 . Visited Mar 2014. E. Recommenders-Contributors. Eclipse SnipMatch. wiki.eclipse.org\/Recommenders\/Snipmatch, 2014. Visited Mar 2014."},{"key":"e_1_3_2_1_44_1","volume-title":"A survey on software clone detection research. Technical report","author":"Roy C. K.","year":"2007","unstructured":"C. K. Roy and J. R. Cordy . A survey on software clone detection research. Technical report , Queen\u2019s University at Kingston, Ontario, 2007 . C. K. Roy and J. R. Cordy. A survey on software clone detection research. Technical report, Queen\u2019s University at Kingston, Ontario, 2007."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_46_1","volume-title":"DTIC Document","author":"Sethuraman J.","year":"1991","unstructured":"J. Sethuraman . A constructive definition of Dirichlet priors. Technical report , DTIC Document , 1991 . J. Sethuraman. A constructive definition of Dirichlet priors. Technical report, DTIC Document, 1991."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3115\/1220175.1220299"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511802478.006"},{"key":"e_1_3_2_1_49_1","first-page":"457","volume-title":"International Conference on Data Mining (ICDM)","author":"Termier A.","unstructured":"A. Termier , M.-C. Rousset , and M. Sebag . Treefinder: a first step towards XML data mining . In International Conference on Data Mining (ICDM) , pages 450\u2013 457 . IEEE, 2002. A. Termier, M.-C. Rousset, and M. Sebag. Treefinder: a first step towards XML data mining. In International Conference on Data Mining (ICDM), pages 450\u2013457. IEEE, 2002."},{"key":"e_1_3_2_1_50_1","volume-title":"Idiomatic JavaScript. https:\/\/github.com\/rwaldron\/idiomatic. js\/","author":"Waldron R.","year":"2014","unstructured":"R. Waldron . Principles of Writing Consistent , Idiomatic JavaScript. https:\/\/github.com\/rwaldron\/idiomatic. js\/ , 2014 . Visited Feb 2014. R. Waldron. Principles of Writing Consistent, Idiomatic JavaScript. https:\/\/github.com\/rwaldron\/idiomatic. js\/, 2014. Visited Feb 2014."},{"key":"e_1_3_2_1_51_1","first-page":"328","volume-title":"Working Conference on Mining Software Repositories (MSR)","author":"Wang J.","unstructured":"J. Wang , Y. Dang , H. Zhang , K. Chen , T. Xie , and D. Zhang . Mining succinct and high-coverage API usage patterns from source code . In Working Conference on Mining Software Repositories (MSR) , pages 319\u2013 328 . IEEE, 2013. J. Wang, Y. Dang, H. Zhang, K. Chen, T. Xie, and D. Zhang. Mining succinct and high-coverage API usage patterns from source code. In Working Conference on Mining Software Repositories (MSR), pages 319\u2013328. IEEE, 2013."},{"key":"e_1_3_2_1_52_1","volume-title":"http:\/\/en.wikibooks. org\/wiki\/More_C%2B%2B_Idioms","author":"Idioms More C","year":"2013","unstructured":"Wikibooks. More C ++ Idioms . http:\/\/en.wikibooks. org\/wiki\/More_C%2B%2B_Idioms , 2013 . Visited Feb 2014. Wikibooks. More C ++ Idioms. http:\/\/en.wikibooks. org\/wiki\/More_C%2B%2B_Idioms, 2013. Visited Feb 2014."},{"key":"e_1_3_2_1_53_1","volume-title":"Gaussian Processes for Machine Learning","author":"Williams C. K.","year":"2006","unstructured":"C. K. Williams and C. E. Rasmussen . Gaussian Processes for Machine Learning , 2006 . C. K. Williams and C. E. Rasmussen. Gaussian Processes for Machine Learning, 2006."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775058"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.125"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_15"}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2635868.2635901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:44Z","timestamp":1750273424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,11]]},"references-count":56,"alternative-id":["10.1145\/2635868.2635901","10.1145\/2635868"],"URL":"https:\/\/doi.org\/10.1145\/2635868.2635901","relation":{},"subject":[],"published":{"date-parts":[[2014,11,11]]},"assertion":[{"value":"2014-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}