{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:25:53Z","timestamp":1725791153959},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.18","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T12:50:08Z","timestamp":1209387008000},"page":"193-202","source":"Crossref","is-referenced-by-count":32,"title":["The Programmer's Lexicon, Volume I: The Verbs"],"prefix":"10.1109","author":[{"given":"Einar W.","family":"Host","sequence":"first","affiliation":[]},{"given":"Bjarte M.","family":"Ostvold","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","article-title":"WordNet: An Electronic Lexical Database","author":"fellbaum","year":"1998"},{"key":"ref3","first-page":"97","article-title":"Concise and consistent naming","author":"dei\u00dfenb\u00f6ck","year":"2005","journal-title":"IEEE Computer Society"},{"article-title":"Principles of Program Analysis","year":"2006","author":"nielson","key":"ref10"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/1094811.1094819","article-title":"Micro patterns in Java code","author":"gil","year":"2005","journal-title":"Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems Languages and Applications OOPSLA 2005 October 16-20 2005"},{"key":"ref5","article-title":"Design Patterns: Elements of Resusable Object-Oriented Software","author":"gamma","year":"1995","journal-title":"Addison-Wesley Professional Computing Series"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.31"},{"key":"ref7","first-page":"40","article-title":"I can read C++ and Java but I can't read Smalltalk","author":"lalonde","year":"2000","journal-title":"Journal of Object-Oriented Programming"},{"key":"ref2","article-title":"Wiley Series in Telecommunications","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref9","article-title":"The Java Virtual Machine Specification","author":"lindholm","year":"1999","journal-title":"The Java Series"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806952"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362913.pdf?arnumber=4362913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T15:48:01Z","timestamp":1557503281000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.18","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}