{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:20:05Z","timestamp":1774718405137,"version":"3.50.1"},"reference-count":175,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T00:00:00Z","timestamp":1587081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772071 and 61690205"],"award-info":[{"award-number":["61772071 and 61690205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"<jats:p>More than 70% of characters in the source code are used to label identifiers. Consequently, identifiers are one of the most important source for program comprehension. Meaningful identifiers are crucial to understand and maintain programs. However, for reasons like constrained schedule, inexperience, and unplanned evolution, identifiers may fail to convey the semantics of the entities associated with them. As a result, such entities should be renamed to improve software quality. However, manual renaming and recommendation are fastidious, time consuming, and error prone, whereas automating the process of renamings is challenging: (1) It involves complex natural language processing to understand the meaning of identifers; (2) It also involves difficult semantic analysis to determine the role of software entities. Researchers proposed a number of approaches and tools to facilitate renamings. We present a survey on existing approaches and classify them into identification of renaming opportunities, execution of renamings, and detection of renamings. We find that there is an imbalance between the three type of approaches, and most of implementation of approaches and evaluation dataset are not publicly available. We also discuss the challenges and present potential research directions. To the best of our knowledge, this survey is the first comprehensive study on renamings of software entities.<\/jats:p>","DOI":"10.1145\/3379443","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:33:47Z","timestamp":1588577627000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":88,"title":["A Survey on Renamings of Software Entities"],"prefix":"10.1145","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6512-4237","authenticated-orcid":false,"given":"Guangjie","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Ally S.","family":"Nyamawe","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"2017. https:\/\/stackoverflow.com\/.  2017. https:\/\/stackoverflow.com\/."},{"key":"e_1_2_2_2_1","unstructured":"2019. https:\/\/www.unisonweb.org\/docs\/tour.  2019. https:\/\/www.unisonweb.org\/docs\/tour."},{"key":"e_1_2_2_3_1","unstructured":"2019. https:\/\/godoc.org\/golang.org\/x\/tools\/go\/loader.  2019. https:\/\/godoc.org\/golang.org\/x\/tools\/go\/loader."},{"key":"e_1_2_2_4_1","unstructured":"2020. https:\/\/github.com\/D12126977\/survey.  2020. https:\/\/github.com\/D12126977\/survey."},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.26"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.29"},{"key":"e_1_2_2_7_1","volume-title":"17th European Conference on Software Maintenance and Reengineering (CSMR\u201913)","author":"Abebe S. L.","year":"2013"},{"key":"e_1_2_2_8_1","volume-title":"a system for detecting software plagiarism","author":"Aiken Alex"},{"key":"e_1_2_2_9_1","volume-title":"IEEE International Conference on Software Maintenance. 300--309","author":"Alhindawi Nouh"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_2_2_12_1","volume-title":"Part-of-speech tagging of source code identifiers using programming language context versus natural language context. Dissertations 8 Theses - Gradworks","author":"Alsuhaibani Reem Saleh","year":"2015"},{"key":"e_1_2_2_13_1","volume-title":"2015 IEEE 5th Workshop on Mining Unstructured Data (MUD). IEEE, 1--6.","author":"Alsuhaibani Reem S."},{"key":"e_1_2_2_14_1","volume-title":"Prioritizing test cases for early detection of refactoring faults. Software Testing Verification 8 Reliability 26, 5","author":"Alves Everton L. G.","year":"2016"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/44546.44552"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/783160.783164"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883003"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9350-8"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.28"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312942"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(96)00083-X"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985471"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1710"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.3115\/974147.974178"},{"key":"e_1_2_2_25_1","volume-title":"Compression and Complexity of Sequences 1997 (SEQUENCES\u201997)","author":"Broder A."},{"key":"e_1_2_2_26_1","volume-title":"A tutorial on support vector machines for pattern recognition. Data Mining 8 Knowledge Discovery 2, 2","author":"Burges Christopher J. C","year":"1998"},{"key":"e_1_2_2_27_1","volume-title":"An Automated Rename Refactoring for Go. Master's Thesis","author":"Reddy Venkatesh"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595782.1595796"},{"key":"e_1_2_2_29_1","volume-title":"INTT: Identifier name tokenisation tool","author":"Butler Simon","year":"2011"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337509"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.50"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080776"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487159"},{"key":"e_1_2_2_35_1","unstructured":"L. W. Cannon R. A. Elliott L. W. Kirchhoff J. H. Miller J. M. Milner R. W. Mitze E. P. Schan N. O. Whittington Henry Spencer David Keppel Mark Brader and Diomidis Spinellis. 1991. Recommended C Style and Coding Standards. Pocket reference guide. Specialized Systems Consultants.  L. W. Cannon R. A. Elliott L. W. Kirchhoff J. H. Miller J. M. Milner R. W. Mitze E. P. Schan N. O. Whittington Henry Spencer David Keppel Mark Brader and Diomidis Spinellis. 1991. Recommended C Style and Coding Standards. Pocket reference guide. Specialized Systems Consultants."},{"key":"e_1_2_2_36_1","volume-title":"International Conference on Software Maintenance, 2000","author":"Caprile B.","year":"2000"},{"key":"e_1_2_2_37_1","volume-title":"6th Working Conference on Reverse Engineering, 1999","author":"Caprile B.","year":"1999"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/947923.947930"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.10.013"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.43410"},{"key":"e_1_2_2_41_1","first-page":"1","article-title":"Toward Refactoring in a Polyglot World","volume":"4","author":"Chen Nicholas","year":"2008","journal-title":"Extending Automated Refactoring Support Across Java and XML."},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.1993.10474605"},{"key":"e_1_2_2_43_1","first-page":"50","article-title":"Renaming global variables in C mechanically proved correct. 216","volume":"2016","author":"Cohen Julien","year":"2016","journal-title":"Proc. VPT"},{"key":"e_1_2_2_44_1","volume-title":"IEEE International Conference on Software Maintenance. 516--519","author":"Collard Michael L."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362682"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2427048.2427050"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.89"},{"key":"e_1_2_2_48_1","first-page":"391","article-title":"Indexing by latent semantic analysis","volume":"41","author":"Deerwester Scott","year":"1990","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-9219-1"},{"key":"e_1_2_2_50_1","volume-title":"3rd International Workshop on Metamodels, Schemas, Grammars and Ontologies (ATEM\u201906)","author":"Deissenboeck Florian","year":"2006"},{"key":"e_1_2_2_51_1","volume-title":"2012 IEEE International Conference on Software Maintenance (ICSM\u201912)","author":"Martino Sergio Di","year":"2012"},{"key":"e_1_2_2_52_1","volume-title":"Proceedings of Workshop on Object Oriented Reengineering (WOOR\u201905)","author":"Dig Danny","year":"2005"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"e_1_2_2_54_1","volume-title":"Ant system: Optimization by a colony of cooperating agents","author":"Dorigo M","year":"1996"},{"key":"e_1_2_2_55_1","volume-title":"6th IEEE International Working Conference on Mining Software Repositories (MSR\u201909)","author":"Enslen E.","year":"2009"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985449"},{"key":"e_1_2_2_58_1","volume-title":"International Conference on Program Comprehension. 4--13","author":"Falleri J. R."},{"key":"e_1_2_2_59_1","volume-title":"IASTED International Conference on Software Engineering and Applications (SEA\u201906)","author":"Feild Henry","year":"2006"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048078"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509520"},{"key":"e_1_2_2_62_1","doi-asserted-by":"crossref","unstructured":"Christiane Fellbaum. 2012. WordNet. Blackwell Publishing Ltd. 231--243.  Christiane Fellbaum. 2012. WordNet. Blackwell Publishing Ltd. 231--243.","DOI":"10.1007\/978-90-481-8847-5_10"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564409"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337249"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094819"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.28"},{"key":"e_1_2_2_69_1","volume-title":"Cognitive dimensions of notations. People and Computers V","author":"Green Thomas R. G.","year":"1989"},{"key":"e_1_2_2_70_1","doi-asserted-by":"crossref","unstructured":"L. Guerrouj. 2013. Normalizing source code vocabulary to support program comprehension and software quality. (2013) 1385--1388.  L. Guerrouj. 2013. Normalizing source code vocabulary to support program comprehension and software quality. (2013) 1385--1388.","DOI":"10.1109\/ICSE.2013.6606723"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.539"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.20"},{"key":"e_1_2_2_73_1","volume-title":"IEEE International Workshop on Source Code Analysis 8 Manipulation.","author":"Guo Xinping"},{"key":"e_1_2_2_74_1","volume-title":"IEEE 21st International Conference on Program Comprehension (ICPC\u201913)","author":"Gupta S.","year":"2013"},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2648616"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9261-0"},{"key":"e_1_2_2_77_1","volume-title":"2008 International Working Conference on Mining Software Repositories (MSR\u201908)","author":"Hill Emily"},{"key":"e_1_2_2_78_1","volume-title":"7th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM\u201907)","author":"Einar","year":"2007"},{"key":"e_1_2_2_79_1","volume-title":"\u00d8stvold","author":"H\u00f8st Einar W.","year":"2008"},{"key":"e_1_2_2_80_1","volume-title":"23rd European Conference on Object-Oriented Programming (ECOOP\u201909)","author":"Einar"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00653"},{"key":"e_1_2_2_82_1","doi-asserted-by":"crossref","unstructured":"T. Imielienskin A. Swami and R. Agrawal. 1993. Mining association rules between set of items in large databases. ACM SIGMOD Record 22 2 (1993).  T. Imielienskin A. Swami and R. Agrawal. 1993. Mining association rules between set of items in large databases. ACM SIGMOD Record 22 2 (1993).","DOI":"10.1145\/170036.170072"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328279.1328283"},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.23"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287634"},{"key":"e_1_2_2_87_1","article-title":"Automatic and accurate expansion of abbreviations in parameters","volume":"10","author":"Jiang Y.","year":"2018","journal-title":"IEEE Transactions on Software Engineering. DOI"},{"key":"e_1_2_2_88_1","volume-title":"The New C Standard: A Cultural and Economic Commentary","author":"Jones Derek M."},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658106"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2002.1019480"},{"key":"e_1_2_2_91_1","volume-title":"ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation (PEPM\u201912)","author":"Karlsen Edvard K."},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2014EDP7276"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747186"},{"key":"e_1_2_2_94_1","volume-title":"33rd International Conference on Software Engineering (ICSE\u201911)","author":"Kawrykow David","year":"1985"},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1636642.1636643"},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9369-5"},{"key":"e_1_2_2_97_1","volume-title":"12th Working Conference on Reverse Engineering (WCRE\u201905)","author":"Kim Sunghun","year":"2005"},{"key":"e_1_2_2_98_1","unstructured":"T. Y. Kim S. Kim J. A. Kim J. Y. Choi J. H. Lee Y. Cho and Y. K. Nam. 2018. Automatic identification of Java method naming patterns using cascade K-medoids. KSII Transactions on Internet 8 Information Systems 12 2 (2018) 873--891.  T. Y. Kim S. Kim J. A. Kim J. Y. Choi J. H. Lee Y. Cho and Y. K. Nam. 2018. Automatic identification of Java method naming patterns using cascade K-medoids. KSII Transactions on Internet 8 Information Systems 12 2 (2018) 873--891."},{"key":"e_1_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808920.1808932"},{"key":"e_1_2_2_100_1","volume-title":"2012 IEEE International Conference on Software Maintenance (ICSM\u201912)","author":"Kusumoto Shinji","year":"2012"},{"key":"e_1_2_2_101_1","volume-title":"18th International Conference on Machine Learning (ICML\u201901)","author":"Lafferty John D."},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080778"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.10"},{"key":"e_1_2_2_104_1","volume-title":"6th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM\u201906)","author":"Lawrie D.","year":"2006"},{"key":"e_1_2_2_105_1","volume-title":"7th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM\u201907)","author":"Lawrie D.","year":"2007"},{"key":"e_1_2_2_106_1","volume-title":"Effective identifier names for comprehension and memory. Innovations in Systems 8 Software Engineering 3, 4","author":"Lawrie Dawn","year":"2007"},{"key":"e_1_2_2_107_1","volume-title":"International Conference on Machine Learning. 1188--1196","author":"Le Quoc","year":"2014"},{"key":"e_1_2_2_108_1","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"Levenshtein V. I.","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_2_2_110_1","volume-title":"Annual Psychology of Programming Workshop","author":"Liblit Ben","year":"2006"},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2017.17"},{"key":"e_1_2_2_112_1","volume-title":"MINIPAR: A minimalist parser. Maryland Linguistics Colloquium","author":"Lin Dekan","year":"1999"},{"key":"e_1_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.1995.479355"},{"key":"e_1_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2427831"},{"key":"e_1_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884841"},{"key":"e_1_2_2_116_1","volume-title":"International Conference on Software Engineering.","author":"Liu Kui","year":"2019"},{"key":"e_1_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"key":"e_1_2_2_118_1","unstructured":"Nioosha Madani. 2010. Heuristic Splitting of Source Code Identifiers. Master's Thesis. Ecole Polytechnique de Montreal Canada.  Nioosha Madani. 2010. Heuristic Splitting of Source Code Identifiers. Master's Thesis. Ecole Polytechnique de Montreal Canada."},{"key":"e_1_2_2_119_1","volume-title":"14th European Conference on Software Maintenance and Reengineering (CSMR\u201910)","author":"Madani N.","year":"2010"},{"key":"e_1_2_2_120_1","volume-title":"15th IEEE International Conference on Automated Software Engineering (ASE\u201900)","author":"Malpohl G.","year":"2000"},{"key":"e_1_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(03)00115-1"},{"key":"e_1_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40411-017-0035-z"},{"key":"e_1_2_2_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541348.2541350"},{"key":"e_1_2_2_124_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44202-9_18"},{"key":"e_1_2_2_125_1","unstructured":"Steve McConnell. 2004. Code Complete. Pearson Education.  Steve McConnell. 2004. Code Complete. Pearson Education."},{"key":"e_1_2_2_126_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_2_2_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.105"},{"key":"e_1_2_2_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368146"},{"key":"e_1_2_2_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.123"},{"key":"e_1_2_2_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083143"},{"key":"e_1_2_2_132_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_23"},{"key":"e_1_2_2_133_1","volume-title":"IEEE International Conference on Software Analysis, Evolution and Reengineering. 228--239","author":"Newman Christian D."},{"key":"e_1_2_2_134_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164320"},{"key":"e_1_2_2_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100047"},{"key":"e_1_2_2_136_1","volume-title":"International Conference on Software Engineering. 1391--1394","author":"Nguyen Hung Viet"},{"key":"e_1_2_2_137_1","unstructured":"S. Nissen. 2005. Neural Networks Made Simple. Software 2.0. 2 14--19.  S. Nissen. 2005. Neural Networks Made Simple. Software 2.0. 2 14--19."},{"key":"e_1_2_2_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.80"},{"key":"e_1_2_2_140_1","volume-title":"IEEE\/ACM International Conference on Automated Software Engineering. 303--312","author":"Jeffrey"},{"key":"e_1_2_2_141_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0176-9"},{"key":"e_1_2_2_142_1","unstructured":"University of Pennsylvania. 2015. Linguistic Data Consortium. (2015).  University of Pennsylvania. 2015. Linguistic Data Consortium. (2015)."},{"key":"e_1_2_2_143_1","volume-title":"Proceedings of the 2nd International Workshop on Refactoring (IWoR\u201918)","author":"Peruma Anthony"},{"key":"e_1_2_2_144_1","doi-asserted-by":"publisher","DOI":"10.1109\/MERCon.2017.7980465"},{"key":"e_1_2_2_145_1","volume-title":"13th Working Conference on Reverse Engineering (WCRE\u201906)","author":"Ratiu D.","year":"2006"},{"key":"e_1_2_2_146_1","volume-title":"IEEE\/ACM 28th International Conference on Automated Software Engineering (ASE\u201913)","author":"Ray B.","year":"2013"},{"key":"e_1_2_2_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2677009"},{"key":"e_1_2_2_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321645"},{"key":"e_1_2_2_149_1","unstructured":"Marjorie Richardson. 1999. ispell: Spelling checker. (1999).  Marjorie Richardson. 1999. ispell: Spelling checker. (1999)."},{"key":"e_1_2_2_150_1","doi-asserted-by":"publisher","DOI":"10.5555\/851042.857047"},{"key":"e_1_2_2_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449787"},{"key":"e_1_2_2_153_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196332"},{"key":"e_1_2_2_155_1","volume-title":"Proceedings of the International Conference on Software and Data Technologies (ICSOFT\u201911)","author":"Schink Hagen","year":"2011"},{"key":"e_1_2_2_156_1","unstructured":"TreeTagger. 2009. https:\/\/www.cis.uni-muenchen.de\/&sim;schmid\/tools\/TreeTagger\/.  TreeTagger. 2009. https:\/\/www.cis.uni-muenchen.de\/&sim;schmid\/tools\/TreeTagger\/."},{"key":"e_1_2_2_157_1","unstructured":"SCOWL. 2017. http:\/\/wordlist.aspell.net\/scowl-readme\/.  SCOWL. 2017. http:\/\/wordlist.aspell.net\/scowl-readme\/."},{"key":"e_1_2_2_158_1","volume-title":"ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering. 49--54","author":"Shepherd David"},{"key":"e_1_2_2_159_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950305"},{"key":"e_1_2_2_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.23"},{"key":"e_1_2_2_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1996.558901"},{"key":"e_1_2_2_162_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2011.21"},{"key":"e_1_2_2_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.63"},{"key":"e_1_2_2_164_1","volume-title":"Probabilistic Graphical Models","author":"Sucar Luis Enrique"},{"key":"e_1_2_2_165_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384416.2384417"},{"key":"e_1_2_2_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597797"},{"key":"e_1_2_2_167_1","first-page":"143","article-title":"The effects of comments and identifier names on program comprehensibility: An experimental investigation","volume":"4","author":"Takang Armstrong A.","year":"1996","journal-title":"J. Prog. Lang."},{"key":"e_1_2_2_168_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321688"},{"key":"e_1_2_2_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808920.1808921"},{"key":"e_1_2_2_170_1","doi-asserted-by":"publisher","DOI":"10.3115\/1073445.1073478"},{"key":"e_1_2_2_171_1","unstructured":"Watkins Trevor. 1996. ML for the working programmer. (1996).  Watkins Trevor. 1996. ML for the working programmer. (1996)."},{"key":"e_1_2_2_172_1","volume-title":"International Workshop on Program Comprehension","author":"Tu Qiang","year":"2002"},{"key":"e_1_2_2_173_1","volume-title":"Proceedings of the Sixth International Workshop on Principles of Software Evolution. 126--130","author":"Van Rysselberghe F."},{"key":"e_1_2_2_174_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134311"},{"key":"e_1_2_2_175_1","volume-title":"Inconsistency detection in software component source code using ant colony optimization and neural network algorithm. Indian Journal of Science 8 Technology 9, 40","author":"Verma Amit","year":"2016"},{"key":"e_1_2_2_176_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.41"},{"key":"e_1_2_2_177_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101919"},{"key":"e_1_2_2_178_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.48"},{"key":"e_1_2_2_179_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.15"},{"key":"e_1_2_2_180_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851772"},{"key":"e_1_2_2_181_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35527-1_20"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:22Z","timestamp":1750197742000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,17]]},"references-count":175,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.1145\/3379443"],"URL":"https:\/\/doi.org\/10.1145\/3379443","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,17]]},"assertion":[{"value":"2019-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}