{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:06:39Z","timestamp":1730253999672,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/icpc.2009.5090039","type":"proceedings-article","created":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T22:22:27Z","timestamp":1246227747000},"page":"158-167","source":"Crossref","is-referenced-by-count":72,"title":["To camelcase or under_score"],"prefix":"10.1109","author":[{"given":"Dave","family":"Binkley","sequence":"first","affiliation":[]},{"given":"Marcia","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Dawn","family":"Lawrie","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Morrell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","first-page":"189","article-title":"software technology maturation","author":"redwine jr","year":"1985","journal-title":"Proceedings of 8th International Conference on Software Engineering"},{"key":"18","article-title":"goto considered harmful' considered harmful","volume":"30","author":"rubin","year":"1987","journal-title":"Communications of the ACM"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.3758\/BF03193811"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/48014.48021"},{"year":"0","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.2307\/2685902"},{"year":"0","key":"11"},{"year":"2004","journal-title":"Guidelines for the use of the C language in critical systems","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1142\/9789812795588_0006"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/ICSM.2000.883022"},{"year":"2001","author":"verbeke","journal-title":"Linear Mixed Models for Longitudinal Data","key":"20"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/ICSM.2008.4658076"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/TSE.2005.97"},{"key":"10","first-page":"171","article-title":"gotos considered harmful and other programmers taboos","volume":"12","author":"marshall","year":"2000","journal-title":"12 th Psychology of Programmers Interest Group Annual Workshop (PPIG"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.infsof.2003.09.016"},{"year":"0","key":"6"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/362929.362947"},{"year":"2005","author":"dei\ufffdenbo?ck","journal-title":"Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005)","article-title":"concise and consistent naming","key":"4"},{"year":"2006","author":"liblit","journal-title":"8th Annual Psychology of Programming Workshop","article-title":"cognitive perspectives on the role of naming in computer programs","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2009 IEEE 17th International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2009,5,17]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,5,19]]}},"container-title":["2009 IEEE 17th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5073941\/5090011\/05090039.pdf?arnumber=5090039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T00:54:40Z","timestamp":1489798480000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5090039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":21,"URL":"http:\/\/dx.doi.org\/10.1109\/icpc.2009.5090039","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}