{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:16:35Z","timestamp":1759032995661,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1645136,1749936"],"award-info":[{"award-number":["1645136,1749936"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389274","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"160-171","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["How Graduate Computing Students Search When Using an Unfamiliar Programming Language"],"prefix":"10.1145","author":[{"given":"Gina R.","family":"Bai","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Joshua","family":"Kayani","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Kathryn T.","family":"Stolee","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Evaluating mechanisms of proactive facilitation in cued recall","volume":"6","author":"Aue William R.","year":"2017","journal-title":"Journal of Memory and Language 94 (1"},{"volume-title":"Exploring Tools and Strategies Used During Regular Expression Composition Tasks. In IEEE\/ACM International Conference on Program Comprehension (ICPC","year":"2019","author":"Bai Gina R.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176671"},{"volume-title":"Ahmed Hassan Awadallah, and Nachiappan Nagappan","year":"2019","author":"Bansal Chetan","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593850.2593854"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999809"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10)","author":"Brandt Joel","key":"e_1_3_2_1_7_1"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09)","author":"Brandt Joel","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9657-y"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277840"},{"volume-title":"Symposium on Applied Computing (SAC '08)","author":"Dur\u00e3o Frederico A.","key":"e_1_3_2_1_11_1"},{"volume":"5","volume-title":"2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)","author":"Hermans F.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083231.1083242"},{"volume-title":"ACM:TOIS (acm:tois ed.)","author":"Fox Steve","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606630"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2661673"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405300"},{"volume-title":"Proceedings of the International Conference on Software Engineering (ICSE '05)","author":"Holmes Reid","key":"e_1_3_2_1_18_1"},{"volume-title":"2012 IEEE 12th International Conference on Advanced Learning Technologies. 116--120","author":"Holvitie J.","key":"e_1_3_2_1_19_1"},{"volume-title":"Proceedings of the ACM Conference on Information and Knowledge Management (CIKM '09)","author":"Huang Jeff","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.03.047"},{"volume-title":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME). 372--380","author":"Jansen B.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","first-page":"6","article-title":"Defining a Session on Web Search Engines","volume":"58","author":"Jansen Bernard J.","year":"2007","journal-title":"Research Articles. J. Am. Soc. Inf. Sci. Technol."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229179.1229181"},{"volume-title":"Gregg Rothermel, Mary Shaw, and Susan Wiedenbeck.","year":"2011","author":"Ko Amy J.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.47"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.116"},{"volume-title":"Sushil Krishna Bajracharya, and Joel Ossher","year":"2007","author":"Lazzarini Lemos Ot\u00e1vio Augusto","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745802.2745805"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.676963"},{"volume-title":"A Small Matter of Programming: Perspectives on End User Computing","author":"Nardi Bonnie A.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-8022(96)00024-0"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1984701.1984706"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196425"},{"key":"e_1_3_2_1_35_1","volume-title":"RACK: Automatic API Recommendation Using Crowdsourced Knowledge. In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)","volume":"1","author":"Rahman Mohammad M.","year":"2016"},{"volume-title":"Automatic query reformulation for code search using crowdsourced knowledge. Empirical Software Engineering (21","year":"2019","author":"Rahman Mohammad M.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.193"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884634"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786855"},{"volume-title":"Estimating the Numbers of End Users and End User Programmers. In Symposium on Visual Languages and Human-Centric Computing (VLHCC '05)","year":"2005","author":"Scaffidi Christopher","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447319009525970"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506508"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380352"},{"volume-title":"A Controlled Experiment on the Process Used by Developers During Internet-Scale Code Search","author":"Sim Susan Elliott","key":"e_1_3_2_1_44_1"},{"volume-title":"Program Comprehension, 1998. IWPC '98. Proceedings., 6th International Workshop on. 180--187","author":"Sim S. E.","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063239.2063243"},{"volume-title":"Proceedings of the 1997 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON '97)","year":"1997","author":"Lethbridge Janice","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581377"},{"volume-title":"Mica: A Web-Search Tool for Finding API Components and Examples. 195--202.","year":"2006","author":"Stylos Jeffrey","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357153"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601269"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.14742\/ajet.822"},{"volume-title":"Archetypal Internet-Scale Source Code Searching","author":"Umarji Medha","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9514-4"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963270"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983955"},{"volume-title":"Domain knowledge, search behaviour, and search effectiveness of engineering and science students: An exploratory study. Information Research 10 (01","year":"2005","author":"Zhang Xiangmin","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348354"}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"ICPC '20"},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389274","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:37Z","timestamp":1750200097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389274"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":58,"alternative-id":["10.1145\/3387904.3389274","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389274","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}