{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T03:32:19Z","timestamp":1768879939856,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007515","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1414172"],"award-info":[{"award-number":["1414172"]}],"id":[{"id":"10.13039\/100007515","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/J017515\/1"],"award-info":[{"award-number":["EP\/J017515\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377816.3381720","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T01:49:05Z","timestamp":1600480145000},"page":"25-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["A theory of dual channel constraints"],"prefix":"10.1145","author":[{"given":"Casey","family":"Casalnuovo","sequence":"first","affiliation":[{"name":"University of California, Davis"}]},{"given":"Earl T.","family":"Barr","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Santanu Kumar","family":"Dash","sequence":"additional","affiliation":[{"name":"University of Surrey"}]},{"given":"Prem","family":"Devanbu","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]},{"given":"Emily","family":"Morgan","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Learning to Represent Programs with Graphs. arXiv preprint arXiv:1711.00740","author":"Allamanis Miltiadis","year":"2017"},{"key":"e_1_3_2_1_2_1","volume-title":"Audience design affects acoustic reduction via production facilitation. Psychonomic bulletin & review 19, 3","author":"Arnold Jennifer E","year":"2012"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-596X(87)90120-3"},{"key":"e_1_3_2_1_4_1","unstructured":"Casey Casalnuovo Kevin Lee Hulin Wang Prem Devanbu and Emily Morgan. 2019. Do People Prefer \"Natural\" code? arXiv:cs.CL\/1910.03704  Casey Casalnuovo Kevin Lee Hulin Wang Prem Devanbu and Emily Morgan. 2019. Do People Prefer \"Natural\" code? arXiv:cs.CL\/1910.03704"},{"key":"e_1_3_2_1_5_1","volume-title":"Studying the Difference Between Natural and Programming Language Corpora. EMSE","author":"Casalnuovo Casey","year":"2018"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236042"},{"key":"e_1_3_2_1_7_1","volume-title":"The Language of Programming: A Cognitive Perspective. Trends in cognitive sciences","author":"Fedorenko Evelina","year":"2019"},{"key":"e_1_3_2_1_8_1","volume-title":"Effect of ambiguity and lexical availability on syntactic and lexical production. Cognitive psychology 40, 4","author":"Ferreira Victor S","year":"2000"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01690965.2011.641388"},{"key":"e_1_3_2_1_10_1","volume-title":"On the Naturalness of Software. In ICSE '12","author":"Hindle Abram","year":"2012"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings ICSE. ACM, 1036--1046","author":"Huang Jianjun","year":"2014"},{"key":"e_1_3_2_1_12_1","first-page":"97","article-title":"Literate","volume":"27","author":"Knuth Donald E","year":"1984","journal-title":"Programming. Comput. J."},{"key":"e_1_3_2_1_13_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. arXiv:1801.01203","author":"Kocher Paul","year":"2018"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613749"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2013.00226"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358502.3361270"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294276"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: New Ideas and Emerging Results"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377816.3381720","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377816.3381720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:52Z","timestamp":1750199932000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377816.3381720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":17,"alternative-id":["10.1145\/3377816.3381720","10.1145\/3377816"],"URL":"https:\/\/doi.org\/10.1145\/3377816.3381720","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}