{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:28Z","timestamp":1750220788442,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389297","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"456-460","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SimplyHover"],"prefix":"10.1145","author":[{"given":"Ahmad","family":"Jbara","sequence":"first","affiliation":[{"name":"School of Computer and Cyber Sciences, Augusta University, Augusta, GA, USA, School of Computer Science, Netanya Academic College, Netanya, Israel"}]},{"given":"Or","family":"Shacham","sequence":"additional","affiliation":[{"name":"School of Computer Science, Netanya Academic College, Netanya, Israel"}]},{"given":"Bar","family":"Ben Michael","sequence":"additional","affiliation":[{"name":"School of Computer Science, Netanya Academic College, Netanya, Israel"}]},{"given":"Omer","family":"Tavor","sequence":"additional","affiliation":[{"name":"School of Computer Science, Netanya Academic College, Netanya, Israel"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"volume-title":"The magic number seven after fifteen years. Studies in long term memory","year":"1975","author":"D. E. BROADBENT.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00033-8"},{"volume-title":"ICSD: Interactive Visual Support for Understanding Code Control Structure. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). 644--648","year":"2019","author":"Jbara A.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"K. Kondo M. Maruishi H. Ueno K. Sawada Y. Hashimoto T. Ohshita T. Takahashi T. Ohtsuki and M. Matsumoto. [n.d.]. The pathophysiology of prospective memory failure after diffuse axonal injury---Lesion-symptom analysis using diffusion tensor imaging. BMC Neuroscience 11 Article 147 ([n.d.]). https:\/\/doi.org\/10.1186\/1471-2202-11-147  K. Kondo M. Maruishi H. Ueno K. Sawada Y. Hashimoto T. Ohshita T. Takahashi T. Ohtsuki and M. Matsumoto. [n.d.]. The pathophysiology of prospective memory failure after diffuse axonal injury---Lesion-symptom analysis using diffusion tensor imaging. BMC Neuroscience 11 Article 147 ([n.d.]). https:\/\/doi.org\/10.1186\/1471-2202-11-147","DOI":"10.1186\/1471-2202-11-147"},{"volume-title":"A complexity measure","author":"McCabe T.","key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240479"},{"volume-title":"Software Psychology: Human Factors in Computer and Information Systems","author":"Shneiderman B.","key":"e_1_3_2_1_8_1"},{"volume-title":"How Big Is a Chunk? Science 183, 4124","year":"1974","author":"Simon Herbert A.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0032954"}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"ICPC '20"},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:42Z","timestamp":1750200102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389297"}},"subtitle":["Improving Comprehension of else Statements"],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":10,"alternative-id":["10.1145\/3387904.3389297","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389297","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}