{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:28Z","timestamp":1750220788488,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389288","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"386-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Linguistic Documentation of Software History"],"prefix":"10.1145","author":[{"given":"Miroslav","family":"Tushev","sequence":"first","affiliation":[{"name":"Louisiana State University, Baton Rouge, LA"}]},{"given":"Anas","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"Louisiana State University, Baton Rouge, LA"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.26"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00012"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"volume-title":"Assessing the relevance of identifier names in a legacy software system","author":"Anquetil Nicolas","key":"e_1_3_2_1_4_1"},{"volume-title":"Massimiliano Di Penta, and Giuliano Antoniol. 104--158. Linguistic antipatterns: What they are and how developers perceive them. Empirical Software Engineering 21 (104-158)","year":"2016","author":"Arnaoudova Venera","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.27"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.18"},{"key":"e_1_3_2_1_8_1","first-page":"993","article-title":"Latent Dirichlet Allocation","author":"Blei David","year":"2003","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.06.002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332446"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901776"},{"volume-title":"Evolution: Language Use and the Evolution of Languages","year":"2013","author":"Croft William","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-9219-1"},{"volume-title":"International Conference on Program Comprehension. 193--202","year":"2012","author":"DeLucia Andrea","key":"e_1_3_2_1_14_1"},{"volume-title":"Improving Source Code Readability: Theory and Practice. In International Conference on Program Comprehension. 2--12","year":"2019","author":"Fakhoury Sarah","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884826"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/1912791"},{"volume-title":"Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code. In Working Conference on Reverse Engineering. 87--91","year":"2011","author":"Grant Scott","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.29"},{"volume-title":"On the Nature of Commits. In International Conference on Automated Software Engineering. 63--71","year":"2008","author":"Hattori Lile","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2007.31"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503746"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-9006-3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9032-2"},{"volume-title":"International Conference on Program Comprehension. 3--12","year":"2006","author":"Lawrie Dawn","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06137"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9473-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1199644"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9512-6"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083143"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693078"},{"volume-title":"Frequency of word-use predicts rates of lexical evolution throughout Indo-European history. Nature 449, 7163","year":"2007","author":"Pagel Mark","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1274044"},{"volume-title":"Statistical laws governing fluctuations in word use from word birth to word death. Scientific reports 2","year":"2012","author":"Petersen Alexander","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2891037"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393646"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Dag Sj\u00f8berg Tore Dyb\u00e5 Bente Anda and Jo Hannay. 2008. Building Theories in Software Engineering. 312-336 pages.  Dag Sj\u00f8berg Tore Dyb\u00e5 Bente Anda and Jo Hannay. 2008. Building Theories in Software Engineering. 312-336 pages.","DOI":"10.1007\/978-1-84800-044-5_12"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2010.0110"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.001"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.13"},{"volume-title":"Linguistic Change in Open Source Software. In International Conference on Software Maintenance and Evolution. 296--300","year":"2019","author":"Tushev Miroslav","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786850"},{"key":"e_1_3_2_1_45_1","first-page":"72","article-title":"Mining version archives for co-changed lines","volume":"6","author":"Zimmermann Thomas","year":"2006","journal-title":"Mining Software Repositories"}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"ICPC '20"},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:42Z","timestamp":1750200102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":45,"alternative-id":["10.1145\/3387904.3389288","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389288","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}