{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:31Z","timestamp":1750219711794,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":106,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616242","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"211-223","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Relationship between Code Verifiability and Understandability"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7139-1573","authenticated-orcid":false,"given":"Kobi","family":"Feldman","sequence":"first","affiliation":[{"name":"College of William and Mary, Williamsburg, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3185-2340","authenticated-orcid":false,"given":"Martin","family":"Kellogg","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2838-685X","authenticated-orcid":false,"given":"Oscar","family":"Chaparro","sequence":"additional","affiliation":[{"name":"College of William and Mary, Williamsburg, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527890"},{"volume-title":"Developer Reading Behavior While Summarizing Java Methods: Size and Context Matters. In Intl. Conf. on Soft. Eng. (ICSE). 384-395","author":"Abid Nahla J.","key":"e_1_3_2_2_2_1","unstructured":"Nahla J. Abid, Bonita Sharif, Natalia Dragan, Hend Alrasheed, and Jonathan I. Maletic. 2019. Developer Reading Behavior While Summarizing Java Methods: Size and Context Matters. In Intl. Conf. on Soft. Eng. (ICSE). 384-395."},{"key":"e_1_3_2_2_3_1","volume-title":"Feitelson","author":"Ajami Shulamyt","year":"2019","unstructured":"Shulamyt Ajami, Yonatan Woodbridge, and Dror G. Feitelson. 2019. Syntax, predicates, idioms-what really affects code complexity? Emp. Soft. Eng. 24, 1 ( 2019 ), 287-328."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081865"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2976072"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Vard Antinyan Miroslaw Staron and Anna Sandberg. 2017. Evaluating code complexity triggers use of complexity measures and the influence of code complexity on maintenance time. Emp. Soft. Eng. 22 6 ( 2017 ) 3057-3087.","DOI":"10.1007\/s10664-017-9508-2"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.130"},{"key":"e_1_3_2_2_8_1","first-page":"470","volume-title":"Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software. In Intl. Conf. on Soft. Analysis, Evolution, and ReEng. (SANER)","volume":"1","author":"Beller Moritz","year":"2016","unstructured":"Moritz Beller, Radjino Bholanath, Shane McIntosh, and Andy Zaidman. 2016. Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software. In Intl. Conf. on Soft. Analysis, Evolution, and ReEng. (SANER), Vol. 1. 470-481."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.49"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Dave Binkley Marcia Davis Dawn Lawrie Jonathan I. Maletic Christopher Morrell and Bonita Sharif. 2013. The impact of identifier style on effort and comprehension. Emp. Soft. Eng. 18 2 ( 2013 ) 219-276.","DOI":"10.1007\/s10664-012-9201-4"},{"key":"e_1_3_2_2_11_1","volume-title":"Rothstein","author":"Borenstein Michael","year":"2009","unstructured":"Michael Borenstein, Larry V. Hedges, Julian P. T. Higgins, and Hannah R. Rothstein. 2009. Introduction to Meta-Analysis. John Wiley & Sons."},{"key":"e_1_3_2_2_12_1","volume-title":"Rothstein","author":"Borenstein Michael","year":"2009","unstructured":"Michael Borenstein, Larry V. Hedges, Julian P. T. Higgins, and Hannah R. Rothstein. 2009. Vote Counting-A New Name for an Old Problem. John Wiley & Sons, 251-255."},{"key":"e_1_3_2_2_13_1","article-title":"The role of method chains and comments in software readability and comprehension-An experiment","volume":"42","author":"B\u00f6rstler J\u00fcrgen","year":"2016","unstructured":"J\u00fcrgen B\u00f6rstler and Barbara Paech. 2016. The role of method chains and comments in software readability and comprehension-An experiment. Trans. on Soft. Eng. (TSE) 42, 9 ( 2016 ), 886-898.","journal-title":"Trans. on Soft. Eng. (TSE)"},{"key":"e_1_3_2_2_14_1","unstructured":"Frederick Brooks and H Kugler. 1987. No silver bullet. April."},{"key":"e_1_3_2_2_15_1","article-title":"Learning a metric for code readability","volume":"36","author":"Buse Raymond","year":"2009","unstructured":"Raymond Buse and Westley Weimer. 2009. Learning a metric for code readability. Trans. on Soft. Eng. (TSE) 36, 4 ( 2009 ), 546-558.","journal-title":"Trans. on Soft. Eng. (TSE)"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17524-9_1"},{"key":"e_1_3_2_2_17_1","first-page":"289","article-title":"Compositional shape analysis by means of bi-abduction","author":"Calcagno Cristiano","year":"2009","unstructured":"Cristiano Calcagno, Dino Distefano, Peter O'Hearn, and Hongseok Yang. 2009. Compositional shape analysis by means of bi-abduction. In Principles of Programming Languages (POPL). 289-300.","journal-title":"Principles of Programming Languages (POPL)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194164.3194186"},{"key":"e_1_3_2_2_19_1","article-title":"A metrics suite for object oriented design","volume":"20","author":"Chidamber S.R.","year":"1994","unstructured":"S.R. Chidamber and C.F. Kemerer. 1994. A metrics suite for object oriented design. Trans. on Soft. Eng. (TSE) 20, 6 ( 1994 ), 476-493.","journal-title":"Trans. on Soft. Eng. (TSE)"},{"key":"e_1_3_2_2_20_1","volume-title":"Aiken","author":"Cohen Jacob","year":"2002","unstructured":"Jacob Cohen, Patricia Cohen, Stephen G. West, and Leona S. Aiken. 2002. Applied Multiple Regression\/Correlation Analysis for the Behavioral Sciences (3 ed.). Routledge."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"B. Curtis S.B. Sheppard P. Milliman M.A. Borst and T. Love. 1979. Measuring the Psychological Complexity of Software Maintenance Tasks with the Halstead and McCabe Metrics. Trans. on Soft. Eng. (TSE) SE-5 2 ( 1979 ) 96-104.","DOI":"10.1109\/TSE.1979.234165"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/582153.582176"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985889"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473934"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.21"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","unstructured":"Kobi Feldman Martin Kellogg and Oscar Chaparro. 2023. Online replication package. ( 2023 ). https:\/\/doi.org\/10.5281\/zenodo.8237328 10.5281\/zenodo.8237328","DOI":"10.5281\/zenodo.8237328"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45251-6_29"},{"key":"e_1_3_2_2_29_1","volume-title":"Mark Lillibridge","author":"Flanagan Cormac","year":"2002","unstructured":"Cormac Flanagan, K Rustan M Leino, Mark Lillibridge, Greg Nelson, James B Saxe, and Raymie Stata. 2002. Extended static checking for Java. In Programming Language Design and Implementation (PLDI). 234-245."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301665"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568266"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806856"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00050"},{"key":"e_1_3_2_2_34_1","volume-title":"Improved Metrics Handling in SonarQube for Software Quality Monitoring. In Intl. Conf. on Distributed Comp. and Art. Intel. 463-470","author":"Garc\u00eda-Munoz Javier","year":"2016","unstructured":"Javier Garc\u00eda-Munoz, Marisol Garc\u00eda-Valls, and Julio Escribano-Barreno. 2016. Improved Metrics Handling in SonarQube for Software Quality Monitoring. In Intl. Conf. on Distributed Comp. and Art. Intel. 463-470."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409714"},{"volume-title":"Elements of Soft. Science","author":"Halstead Maurice H.","key":"e_1_3_2_2_36_1","unstructured":"Maurice H. Halstead. 1977. Elements of Soft. Science. Elsevier."},{"key":"e_1_3_2_2_37_1","volume-title":"Doing Meta-Analysis With R: A Hands-On Guide","author":"Harrer Mathias","unstructured":"Mathias Harrer, Pim Cuijpers, Furukawa Toshi A, and David D Ebert. 2021. Doing Meta-Analysis With R: A Hands-On Guide (1st ed.). Chapman & Hall\/CRC Press, Boca Raton, FL and London.","edition":"1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Klaus Havelund and Thomas Pressburger. 2000. Model checking java programs using java pathfinder. Intl. Jour. on Soft. Tools for Technology Transfer 2 4 ( 2000 ) 366-381.","DOI":"10.1007\/s100090050043"},{"volume-title":"Object-oriented metrics: measures of complexity","author":"Henderson-Sellers Brian","key":"e_1_3_2_2_39_1","unstructured":"Brian Henderson-Sellers. 1995. Object-oriented metrics: measures of complexity. Prentice-Hall, Inc."},{"key":"e_1_3_2_2_40_1","unstructured":"Sture Holm. 1979. A simple sequentially rejective multiple test procedure. Scandinavian journal of statistics ( 1979 ) 65-70."},{"key":"e_1_3_2_2_41_1","volume-title":"Feitelson","author":"Jbara Ahmad","year":"2017","unstructured":"Ahmad Jbara and Dror G. Feitelson. 2017. How programmers read regular code: a controlled experiment using eye tracking. Emp. Soft. Eng. 22, 3 ( 2017 ), 1440-1477."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_2_43_1","volume-title":"An Empirical Study Assessing Source Code Readability in Comprehension. In Intl. Conf. on Soft. Maint. and Evol. (ICSME). 513-523","author":"Johnson John","year":"2019","unstructured":"John Johnson, Sergio Lubo, Nishitha Yedla, Jairo Aponte, and Bonita Sharif. 2019. An Empirical Study Assessing Source Code Readability in Comprehension. In Intl. Conf. on Soft. Maint. and Evol. (ICSME). 513-523."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41528-4_19"},{"volume-title":"Intl. Soft. Metrics Symp. (METRICS).","author":"Kaner Cem","key":"e_1_3_2_2_45_1","unstructured":"Cem Kaner, Senior Member, and Walter P. Bond. 2004. Software Engineering Metrics: What Do They Measure and How Do We Know?. In Intl. Soft. Metrics Symp. (METRICS)."},{"volume-title":"Intl. Symp. on Soft. Testing and Analysis (ISSTA). 3-14","author":"Kellogg Martin","key":"e_1_3_2_2_46_1","unstructured":"Martin Kellogg, Vlastimil Dort, Suzanne Millstein, and Michael D. Ernst. 2018. Lightweight verification of array indexing. In Intl. Symp. on Soft. Testing and Analysis (ISSTA). 3-14."},{"volume-title":"Verifying Object Construction. In Intl. Conf. on Soft. Eng. (ICSE). 1447-1458","author":"Kellogg Martin","key":"e_1_3_2_2_47_1","unstructured":"Martin Kellogg, Manli Ran, Manu Sridharan, Martin Sch\u00e4f, and Michael D. Ernst. 2020. Verifying Object Construction. In Intl. Conf. on Soft. Eng. (ICSE). 1447-1458."},{"volume-title":"European Soft. Eng. Conf. and Symp. on the Found. of Soft. Eng. (ESEC\/FSE).","author":"Kellogg Martin","key":"e_1_3_2_2_48_1","unstructured":"Martin Kellogg, Narges Shadab, Manu Sridharan, and Michael D. Ernst. 2021. Lightweight and modular resource leak verification. In European Soft. Eng. Conf. and Symp. on the Found. of Soft. Eng. (ESEC\/FSE)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Maurice G. Kendall. 1938. A new measure of rank correlation. Biometrika 30 1 \/2 ( 1938 ) 81-93.","DOI":"10.1093\/biomet\/30.1-2.81"},{"key":"e_1_3_2_2_50_1","unstructured":"Steve Klabnik and Carol Nichols. 2018. The Rust Programming Language. https: \/\/doc.rust-lang. org\/1.50.0\/book\/"},{"key":"e_1_3_2_2_51_1","volume-title":"European Conf. on Object-Oriented Programming (ECOOP)","author":"Kr\u00fcger Stefan","year":"2018","unstructured":"Stefan Kr\u00fcger, Johannes Sp\u00e4th, Karim Ali, Eric Bodden, and Mira Mezini. 2018. CrySL: An extensible approach to validating the correct usage of cryptographic APIs. In European Conf. on Object-Oriented Programming (ECOOP). Amsterdam, Netherlands, 10 : 1-10 : 27."},{"key":"e_1_3_2_2_52_1","volume-title":"Atoms of Confusion in Java. In Intl. Conf. on Prog. Compr. (ICPC). 25-35","author":"Langhout Chris","year":"2021","unstructured":"Chris Langhout and Maur\u00edcio Aniche. 2021. Atoms of Confusion in Java. In Intl. Conf. on Prog. Compr. (ICPC). 25-35."},{"volume-title":"European Soft. Eng. Conf. and the Symp. on on the Found. of Soft. Eng. (ESEC\/FSE). 361-370","author":"LaToza Thomas D.","key":"e_1_3_2_2_53_1","unstructured":"Thomas D. LaToza, David Garlan, James D. Herbsleb, and Brad A. Myers. 2007. Program comprehension as fact finding. In European Soft. Eng. Conf. and the Symp. on on the Found. of Soft. Eng. (ESEC\/FSE). 361-370."},{"key":"e_1_3_2_2_54_1","volume-title":"Formal Underpinnings of Java Workshop (at OOPSLA 1998 ). Citeseer, 404-420","author":"Leavens Gary T","year":"1998","unstructured":"Gary T Leavens, Albert L Baker, and Clyde Ruby. 1998. JML: a Java modeling language. In Formal Underpinnings of Java Workshop (at OOPSLA 1998 ). Citeseer, 404-420."},{"key":"e_1_3_2_2_55_1","volume-title":"Samuel Z. Guyer, Uday P. Khedker, Anders M\u00f8ller, and Dimitrios Vardoulakis.","author":"Livshits Benjamin","year":"2015","unstructured":"Benjamin Livshits, Manu Sridharan, Yannis Smaragdakis, Ond\u0159ej Lhot\u00e1k, J. Nelson Amaral, Bor-Yuh Evan Chang, Samuel Z. Guyer, Uday P. Khedker, Anders M\u00f8ller, and Dimitrios Vardoulakis. 2015. In defense of soundiness: A manifesto. Commun. ACM 58, 2 ( 2015 ), 44-46."},{"key":"e_1_3_2_2_56_1","article-title":"On the Comprehension of Program","volume":"23","author":"Maalej Walid","year":"2014","unstructured":"Walid Maalej, Rebecca Tiarks, Tobias Roehm, and Rainer Koschke. 2014. On the Comprehension of Program Comprehension. Trans. on Soft. Eng. and Methodology (TSEM) 23, 4 ( 2014 ), 1-37.","journal-title":"Comprehension. Trans. on Soft. Eng. and Methodology (TSEM)"},{"key":"e_1_3_2_2_57_1","volume-title":"An Empirical Assessment of Repositioning of Static Analysis Alarms. In Intl. Working Conf. on Source Code Analysis & Manipulation.","author":"Mansoor Niloofar","year":"2022","unstructured":"Niloofar Mansoor, Tukaram Muske, Alexander Serebrenik, and Bonita Sharif. 2022. An Empirical Assessment of Repositioning of Static Analysis Alarms. In Intl. Working Conf. on Source Code Analysis & Manipulation."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"crossref","unstructured":"T.J. McCabe. 1976. A Complexity Measure. Trans. on Soft. Eng. (TSE) SE-2 4 ( 1976 ) 308-320.","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.12"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78142-2_8"},{"key":"e_1_3_2_2_61_1","unstructured":"Jacqueline Murray. 2013. Likert data: what to use parametric or non-parametric? Intl. Jour. of Business and Social Science 4 11 ( 2013 )."},{"key":"e_1_3_2_2_62_1","volume-title":"Intl. Symp. on Emp. Soft. Eng. and Meas. (ESEM). 1-12","author":"Bar\u00f3n Marvin Mu\u00f1oz","year":"2020","unstructured":"Marvin Mu\u00f1oz Bar\u00f3n, Marvin Wyrich, and Stefan Wagner. 2020. An Empirical Validation of Cognitive Complexity as a Measure of Source Code Understandability. In Intl. Symp. on Emp. Soft. Eng. and Meas. (ESEM). 1-12."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534374"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"Alberto S. Nu\u00f1ez-Varela H\u00e9ctor G. P\u00e9rez-Gonzalez Francisco E. Mart\u00ednez-Perez and Carlos Soubervielle-Montalvo. 2017. Source code metrics: A systematic mapping study. Jour. of Sys. and Soft. 128 ( 2017 ) 164-197.","DOI":"10.1016\/j.jss.2017.03.044"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44802-0_1"},{"key":"e_1_3_2_2_66_1","volume-title":"Evaluating Code Readability and Legibility: An Examination of Human-centric Studies. In Intl. Conf. on Soft. Maint. and Evol. (ICSME). 348-359","author":"Oliveira Delano","year":"2020","unstructured":"Delano Oliveira, Reydne Bruno, Fernanda Madeiral, and Fernando Castor. 2020. Evaluating Code Readability and Legibility: An Examination of Human-centric Studies. In Intl. Conf. on Soft. Maint. and Evol. (ICSME). 348-359."},{"key":"e_1_3_2_2_67_1","unstructured":"OpenJML Developers. 2022. OpenJML-formal methods tool for Java and the Java Modeling Language (JML). https:\/\/www.openjml.org\/documentation\/introduction.html."},{"key":"e_1_3_2_2_68_1","first-page":"201","volume-title":"Intl. Symp. on Soft. Testing and Analysis (ISSTA)","author":"Papi Matthew M.","unstructured":"Matthew M. Papi, Mahmood Ali, Telmo Luis Correa Jr., Jeff H. Perkins, and Michael D. Ernst. 2008. Practical pluggable types for Java. In Intl. Symp. on Soft. Testing and Analysis (ISSTA). Seattle, WA, USA, 201-212."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00056"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389279"},{"key":"e_1_3_2_2_71_1","article-title":"A look into programmers' heads","volume":"46","author":"Peitek Norman","year":"2018","unstructured":"Norman Peitek, Janet Siegmund, Sven Apel, Christian K\u00e4stner, Chris Parnin, Anja Bethmann, Thomas Leich, Gunter Saake, and Andr\u00e9 Brechmann. 2018. A look into programmers' heads. Trans. on Soft. Eng. (TSE) 46, 4 ( 2018 ), 442-462.","journal-title":"Trans. on Soft. Eng. (TSE)"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"crossref","unstructured":"Valentina Piantadosi Fabiana Fierro Simone Scalabrino Alexander Serebrenik and Rocco Oliveto. 2020. How does code readability change during software evolution? Emp. Soft. Eng. 25 6 ( 2020 ) 5374-5412.","DOI":"10.1007\/s10664-020-09886-9"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"crossref","unstructured":"James E Pustejovsky and Elizabeth Tipton. 2022. Meta-analysis with robust variance estimation: Expanding the range of working models. Prevention Science 23 3 ( 2022 ) 425-438.","DOI":"10.1007\/s11121-021-01246-3"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"volume-title":"Intl. Symp. on Soft. Reliab. Eng. 245-256","author":"Rutar Nick","key":"e_1_3_2_2_75_1","unstructured":"Nick Rutar, Christian B. Almazan, and Jeffrey S. Foster. 2004. A comparison of bug finding tools for Java. In Intl. Symp. on Soft. Reliab. Eng. 245-256."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144743"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.76"},{"key":"e_1_3_2_2_78_1","article-title":"Automatically assessing code understandability","volume":"47","author":"Scalabrino Simone","year":"2019","unstructured":"Simone Scalabrino, Gabriele Bavota, Christopher Vendome, Mario LinaresVasquez, Denys Poshyvanyk, and Rocco Oliveto. 2019. Automatically assessing code understandability. Trans. on Soft. Eng. (TSE) 47, 3 ( 2019 ), 595-613.","journal-title":"Trans. on Soft. Eng. (TSE)"},{"key":"e_1_3_2_2_79_1","unstructured":"Martin Sch\u00e4f and Philipp R\u00fcmmer. 2022. personal communication."},{"key":"e_1_3_2_2_80_1","volume-title":"Jonkman","author":"Sidik Kurex","year":"2005","unstructured":"Kurex Sidik and Jeffrey N. Jonkman. 2005. Simple heterogeneity variance estimation for meta-analysis. Jour. of the Royal Statistical Society : Series C (Applied Statistics) 54, 2 ( 2005 ), 367-384."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.35"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568252"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106268"},{"key":"e_1_3_2_2_84_1","volume-title":"Symp. on Usable Privacy and Security (SOUPS). 221-238","author":"Smith Justin","year":"2020","unstructured":"Justin Smith, Lisa Nguyen Quang Do, and Emerson Murphy-Hill. 2020. Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security. In Symp. on Usable Privacy and Security (SOUPS). 221-238."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"crossref","unstructured":"Harry M. Sneed. 1995. Understanding software through numbers: A metric based approach to program comprehension. Jour. of Soft. Maint.: Research and Practice 7 6 ( 1995 ) 405-419.","DOI":"10.1002\/smr.4360070604"},{"key":"e_1_3_2_2_86_1","first-page":"20","volume-title":"FTfJP: 14th Workshop on Formal Techniques for Java-like Programs","author":"Spishak Eric","unstructured":"Eric Spishak, Werner Dietl, and Michael D. Ernst. 2012. A type system for regular expressions. In FTfJP: 14th Workshop on Formal Techniques for Java-like Programs. Beijing, China, 20-26."},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"crossref","unstructured":"M. A. D. Storey K. Wong and H. A. M\u00fcller. 2000. How do program understanding tools affect how programmers understand programs ? Science of Computer Programming 36 2 ( 2000 ) 183-207.","DOI":"10.1016\/S0167-6423(99)00036-2"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.1986.6312929","article-title":"Typestate: A programming language concept for enhancing software reliability","author":"Strom Robert E.","year":"1986","unstructured":"Robert E. Strom and Shaula Yemini. 1986. Typestate: A programming language concept for enhancing software reliability. IEEE Transactions on Software Sngineering SE-12, 1 (Jan. 1986 ), 157-171.","journal-title":"IEEE Transactions on Software Sngineering SE-12, 1"},{"volume-title":"Intl. Conf. on Soft. Maint. (ICSM). 326-335","author":"Tahir Amjed","key":"e_1_3_2_2_89_1","unstructured":"Amjed Tahir and Stephen G. MacDonell. 2012. A systematic mapping study on dynamic metrics and software quality. In Intl. Conf. on Soft. Maint. (ICSM). 326-335."},{"key":"e_1_3_2_2_90_1","volume-title":"Symp. on the Found. of Soft. Eng. (FSE). 1-11","author":"Tao Yida","year":"2012","unstructured":"Yida Tao, Yingnong Dang, Tao Xie, Dongmei Zhang, and Sunghun Kim. 2012. How do software engineers understand code changes? an exploratory study in industry. In Symp. on the Found. of Soft. Eng. (FSE). 1-11."},{"key":"e_1_3_2_2_91_1","unstructured":"The Checker Framework Developers. 2022. 2.4.5 What to do if a checker issues a warning about your code. https:\/\/checkerframework.org\/manual\/#handlingwarnings."},{"key":"e_1_3_2_2_92_1","unstructured":"The Checker Framework Developers. 2022. Optional Checker for possiblypresent data. https:\/\/tinyurl.com\/3surnw4a."},{"key":"e_1_3_2_2_93_1","unstructured":"The OpenJML Developers. 2022. OpenJML. https:\/\/www.openjml.org\/."},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196441"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578153.2578218"},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.44"},{"key":"e_1_3_2_2_97_1","volume-title":"van Valkengoed and Linda Steg","author":"Anne","year":"2019","unstructured":"Anne M. van Valkengoed and Linda Steg. 2019. Meta-analyses of factors motivating climate change adaptation behaviour. Nature Climate Change ( 2019 ), 158-163."},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"crossref","unstructured":"Carmine Vassallo Sebastiano Panichella Fabio Palomba Sebastian Proksch Harald C. Gall and Andy Zaidman. 2020. How developers engage with static analysis tools in different contexts. Emp. Soft. Eng. 25 2 ( 2020 ) 1419-1457.","DOI":"10.1007\/s10664-019-09750-5"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v036.i03"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"crossref","unstructured":"David Walker. 2003. JMASM9: Converting Kendall's Tau For Correlational Or Meta-Analytic Analyses. Jour. of M. A. Stat. Meth. 2 2 ( 2003 ).","DOI":"10.22237\/jmasm\/1067646360"},{"volume-title":"Intl. Symp. on Soft. Testing and Analysis (ISSTA). 127-137","author":"Weitz Konstantin","key":"e_1_3_2_2_101_1","unstructured":"Konstantin Weitz, Gene Kim, Siwakorn Srisakaokul, and Michael D. Ernst. 2014. A type system for format strings. In Intl. Symp. on Soft. Testing and Analysis (ISSTA). 127-137."},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEET.2019.00017"},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00055"},{"key":"e_1_3_2_2_104_1","article-title":"Measuring Program Comprehension: A Large-Scale Field Study with Professionals","volume":"44","author":"Xia Xin","year":"2018","unstructured":"Xin Xia, Lingfeng Bao, David Lo, Zhenchang Xing, Ahmed E. Hassan, and Shanping Li. 2018. Measuring Program Comprehension: A Large-Scale Field Study with Professionals. Trans. on Soft. Eng. (TSE) 44, 10 ( 2018 ), 951-976.","journal-title":"Trans. on Soft. Eng. (TSE)"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190486"},{"key":"e_1_3_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1993.263911"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"San Francisco CA USA","acronym":"ESEC\/FSE '23"},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:03Z","timestamp":1750178163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":106,"alternative-id":["10.1145\/3611643.3616242","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616242","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}