{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:22Z","timestamp":1750220842770,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2019,11,14]]},"abstract":"<jats:p>The study of eye gaze data has great potential for research in computer programming, computing education, and software engineering practice. To highlight its role for the software engineering community, the Sixth Edition of the International Workshop on Eye Movements in Programming (EMIP 2019) was co-located with the 41st International Conference on Software Engineering. The goal of the workshop was to advance the methodology of using eye tracking for programming, both theoretically and in applications.<\/jats:p>","DOI":"10.1145\/3356773.3356809","type":"journal-article","created":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T22:07:36Z","timestamp":1573769256000},"page":"54-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Summary of the Sixth Edition of the International Workshop on Eye Movements in Programming"],"prefix":"10.1145","volume":"44","author":[{"given":"Janet","family":"Siegmund","sequence":"first","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"given":"Andrew","family":"Begel","sequence":"additional","affiliation":[{"name":"Microsoft Research, , CA, USA"}]},{"given":"Norman","family":"Peitek","sequence":"additional","affiliation":[{"name":"Leibniz Institute for Neurobiology, Magdeburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"2","volume-title":"Proceedings of the 6th International Workshop on Eye Movements in Programming","author":"Schneider K.","year":"2019","unstructured":"Ahrens, K. Schneider , and M. Busch . Attention in Software Maintenance: An Eye Tracking Study . Proceedings of the 6th International Workshop on Eye Movements in Programming , pages 2 -- 9 . IEEE Press , 2019 . Ahrens, K. Schneider, and M. Busch. Attention in Software Maintenance: An Eye Tracking Study. Proceedings of the 6th International Workshop on Eye Movements in Programming, pages2--9. IEEE Press, 2019."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193129103502012"},{"issue":"1","key":"e_1_2_1_3_1","first-page":"25","article-title":"How Do We Read Algorithms?","volume":"23","author":"Crosby M. E.","year":"1990","unstructured":"M. E. Crosby and J. Stelovsky . How Do We Read Algorithms? A Case Study. Computer , 23 ( 1 ): 25 -- 35 , Jan. 1990 M. E. Crosby and J. Stelovsky. How Do We Read Algorithms? A Case Study. Computer, 23(1):25--35, Jan. 1990","journal-title":"A Case Study. Computer"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMIP.2019.00010"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMIP.2019.00013"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMIP.2019.00012"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.1999.00052.x"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMIP.2019.00011"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMIP.2019.00015"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMIP.2019.00014"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3356773.3356809","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3356773.3356809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:22:55Z","timestamp":1750202575000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3356773.3356809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,11,14]]}},"alternative-id":["10.1145\/3356773.3356809"],"URL":"https:\/\/doi.org\/10.1145\/3356773.3356809","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2020-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}