{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:26:47Z","timestamp":1730294807625,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.17","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T12:50:08Z","timestamp":1209387008000},"page":"213-222","source":"Crossref","is-referenced-by-count":36,"title":["Extracting Meaning from Abbreviated Identifiers"],"prefix":"10.1109","author":[{"given":"Dawn","family":"Lawrie","sequence":"first","affiliation":[]},{"given":"Henry","family":"Feild","sequence":"additional","affiliation":[]},{"given":"David","family":"Binkley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(00)00029-7"},{"key":"ref11","article-title":"Memory for a short sequence of assignment statements","volume":"16","author":"jones","year":"2004","journal-title":"C Vu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231227"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/160688.160718"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/336597.336664"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.31"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.34"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.51"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/32.83915"},{"journal-title":"Foundations of Statistical Natural Language Processing","year":"1999","author":"manning","key":"ref19"},{"journal-title":"Web It 5-gram Version 1","year":"2006","author":"brants","key":"ref4"},{"journal-title":"SLOC count user's guide","year":"2005","author":"wheeler","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806952"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324999002120"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671105"},{"key":"ref9","article-title":"An empirical comparison of techniques for extracting concept abbreviations from identifiers","author":"feild","year":"2006","journal-title":"Proceedings of lASTED International Conference on Software Engineering and Applications (SEA 2006)"},{"key":"ref1","article-title":"Assessing the relevance of identifier names in a legacy software system","author":"anquetil","year":"1998","journal-title":"Proceedings of the 1998 Conference of the Centre for Advanced Studies on Collaborative Research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989796"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"ref24","article-title":"Semi-supervised maximum entropy based approach to acronym and abbreviation normalization in medical texts","author":"pakhomov","year":"2002","journal-title":"Proceedings of the 40th Annual Meeting on Association for Computational Linguistics - ACL '02"},{"key":"ref23","article-title":"Source code informal information analysis using connectionnist models","volume":"2","author":"merlo","year":"1993","journal-title":"IJCAI Int Joint Conf on Artificial Intelligence"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1996.558901"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199195"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362915.pdf?arnumber=4362915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T17:11:21Z","timestamp":1489597881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.17","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}