{"id":"https://openalex.org/W2163227181","doi":"https://doi.org/10.1109/icsm.2006.10","title":"Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding","display_name":"Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding","publication_year":2006,"publication_date":"2006-09-01","ids":{"openalex":"https://openalex.org/W2163227181","doi":"https://doi.org/10.1109/icsm.2006.10","mag":"2163227181"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2006.10","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://drops.dagstuhl.de/storage/16dagstuhl-seminar-proceedings/dsp-vol06301/DagSemProc.06301.4/DagSemProc.06301.4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044137429","display_name":"Nicolas Gold","orcid":"https://orcid.org/0000-0002-2195-5995"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"funder","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nicolas Gold","raw_affiliation_strings":["Computer Science Department Strand, King''s College, London, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Department Strand, King''s College, London, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000019783","display_name":"Mark Harman","orcid":"https://orcid.org/0000-0002-5864-4488"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"funder","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mark Harman","raw_affiliation_strings":["Computer Science Department Strand, King''s College, London, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Department Strand, King''s College, London, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100414996","display_name":"Zheng Li","orcid":"https://orcid.org/0000-0002-3938-7033"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"funder","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zheng Li","raw_affiliation_strings":["Computer Science Department Strand, King''s College, London, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Department Strand, King''s College, London, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024150069","display_name":"Kiarash Mahdavi","orcid":null},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"funder","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kiarash Mahdavi","raw_affiliation_strings":["Computer Science Department Strand, King''s College, London, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Department Strand, King''s College, London, UK","institution_ids":["https://openalex.org/I183935753"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.574,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":28,"citation_normalized_percentile":{"value":0.852302,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":null,"issue":null,"first_page":"310","last_page":"319"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.48818213},{"id":"https://openalex.org/keywords/program-comprehension","display_name":"Program comprehension","score":0.46090683}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7124831},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.608008},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5544443},{"id":"https://openalex.org/C125583679","wikidata":"https://www.wikidata.org/wiki/Q755673","display_name":"Search algorithm","level":2,"score":0.5082109},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.48818213},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.4831571},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.46990225},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.46090683},{"id":"https://openalex.org/C110332635","wikidata":"https://www.wikidata.org/wiki/Q629498","display_name":"Genetic programming","level":2,"score":0.4527942},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39879966},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.36416677},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27003676},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16496828},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.14052239},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2006.10","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.06301.4","pdf_url":"https://drops.dagstuhl.de/storage/16dagstuhl-seminar-proceedings/dsp-vol06301/DagSemProc.06301.4/DagSemProc.06301.4.pdf","source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":["Schloss Dagstuhl \u2013 Leibniz Center for Informatics"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10024609/","pdf_url":"https://discovery.ucl.ac.uk/10024609/1/Mahdavi_Allowing_Overlapping_Boundaries.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":["University College London"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10024609/1/Mahdavi_Allowing_Overlapping_Boundaries.pdf","pdf_url":"https://discovery.ucl.ac.uk/id/eprint/10024609/1/Mahdavi_Allowing_Overlapping_Boundaries.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":["University College London"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.06301.4","pdf_url":"https://drops.dagstuhl.de/storage/16dagstuhl-seminar-proceedings/dsp-vol06301/DagSemProc.06301.4/DagSemProc.06301.4.pdf","source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":["Schloss Dagstuhl \u2013 Leibniz Center for Informatics"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":33,"referenced_works":["https://openalex.org/W1497256448","https://openalex.org/W1505381032","https://openalex.org/W1508357244","https://openalex.org/W1594437224","https://openalex.org/W1597745456","https://openalex.org/W1606791384","https://openalex.org/W1639032689","https://openalex.org/W1670928054","https://openalex.org/W170053026","https://openalex.org/W1965982049","https://openalex.org/W1971546034","https://openalex.org/W1975033347","https://openalex.org/W1977004736","https://openalex.org/W2028806953","https://openalex.org/W2052592404","https://openalex.org/W2088448861","https://openalex.org/W2097571405","https://openalex.org/W2106632739","https://openalex.org/W2110220994","https://openalex.org/W2111250043","https://openalex.org/W2114776669","https://openalex.org/W2124023550","https://openalex.org/W2125116336","https://openalex.org/W2128990852","https://openalex.org/W2131507179","https://openalex.org/W2158997610","https://openalex.org/W2173469511","https://openalex.org/W2293624369","https://openalex.org/W3023540311","https://openalex.org/W3158027121","https://openalex.org/W4239572444","https://openalex.org/W4245176872","https://openalex.org/W4247632680"],"related_works":["https://openalex.org/W4241100723","https://openalex.org/W3081644756","https://openalex.org/W3010807105","https://openalex.org/W2598318421","https://openalex.org/W2240979497","https://openalex.org/W2165862892","https://openalex.org/W2122804569","https://openalex.org/W2081938705","https://openalex.org/W2025599150","https://openalex.org/W1924474669"],"abstract_inverted_index":{"One":[0],"approach":[1],"to":[2,9,15,33,42,47,50,103],"supporting":[3],"program":[4],"comprehension":[5],"involves":[6],"binding":[7,17,39,54],"concepts":[8,41],"source":[10,43],"code.":[11,44],"Previously":[12],"proposed":[13],"approaches":[14],"concept":[16,53,71],"have":[18],"enforced":[19],"nonoverlapping":[20],"boundaries.":[21],"However,":[22],"real-world":[23],"programs":[24,107],"may":[25],"contain":[26],"overlapping":[27,70],"concepts.":[28],"This":[29],"paper":[30,95],"presents":[31],"techniques":[32],"allow":[34,48],"boundary":[35],"overlap":[36],"in":[37],"the":[38,52,66,77,92,110,119,128],"of":[40,69,79],"In":[45],"order":[46],"boundaries":[49],"overlap,":[51],"problem":[55],"is":[56,63,73],"reformulated":[57],"as":[58],"a":[59],"search":[60,67,81],"problem.":[61],"It":[62],"shown":[64],"that":[65,99,118],"space":[68],"bindings":[72],"exponentially":[74],"large,":[75],"indicating":[76],"suitability":[78],"sampling-based":[80],"algorithms.":[82],"Hill":[83],"climbing":[84],"and":[85,131],"genetic":[86,120],"algorithms":[87,102],"are":[88],"introduced":[89],"for":[90],"sampling":[91],"space.":[93],"The":[94,115],"reports":[96],"on":[97],"experiments":[98],"apply":[100],"these":[101],"21":[104],"COBOL":[105],"II":[106],"taken":[108],"from":[109],"commercial":[111],"financial":[112],"services":[113],"sector.":[114],"results":[116],"show":[117],"algorithm":[121],"produces":[122],"significantly":[123],"better":[124],"solutions":[125],"than":[126],"both":[127],"hill":[129],"climber":[130],"random":[132],"search.":[133]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2163227181","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2025-03-20T23:44:33.146311","created_date":"2016-06-24"}