{"id":"https://openalex.org/W2099629936","doi":"https://doi.org/10.1109/icsm.2007.4362682","title":"Smart Formatter: Learning Coding Style from Existing Source Code","display_name":"Smart Formatter: Learning Coding Style from Existing Source Code","publication_year":2007,"publication_date":"2007-10-01","ids":{"openalex":"https://openalex.org/W2099629936","doi":"https://doi.org/10.1109/icsm.2007.4362682","mag":"2099629936"},"language":"en","primary_location":{"id":"doi:10.1109/icsm.2007.4362682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2007.4362682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE International Conference on Software Maintenance","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098042678","display_name":"Filippo Corbo","orcid":null},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Filippo Corbo","raw_affiliation_strings":["RCOST-Research Centre on Software Technology, Department of Engineering, University of Sannio, Benevento, Italy","University of Sannio, Benevento#TAB#"],"affiliations":[{"raw_affiliation_string":"RCOST-Research Centre on Software Technology, Department of Engineering, University of Sannio, Benevento, Italy","institution_ids":["https://openalex.org/I16337185"]},{"raw_affiliation_string":"University of Sannio, Benevento#TAB#","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062935676","display_name":"Concettina Del Grosso","orcid":null},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Concettina del Grosso","raw_affiliation_strings":["RCOST-Research Centre on Software Technology, Department of Engineering, University of Sannio, Benevento, Italy","University of Sannio, Benevento#TAB#"],"affiliations":[{"raw_affiliation_string":"RCOST-Research Centre on Software Technology, Department of Engineering, University of Sannio, Benevento, Italy","institution_ids":["https://openalex.org/I16337185"]},{"raw_affiliation_string":"University of Sannio, Benevento#TAB#","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025099559","display_name":"Massimiliano Di Penta","orcid":"https://orcid.org/0000-0002-0340-9747"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Massimiliano di Penta","raw_affiliation_strings":["RCOST-Research Centre on Software Technology, Department of Engineering, University of Sannio, Benevento, Italy","University of Sannio, Benevento#TAB#"],"affiliations":[{"raw_affiliation_string":"RCOST-Research Centre on Software Technology, Department of Engineering, University of Sannio, Benevento, Italy","institution_ids":["https://openalex.org/I16337185"]},{"raw_affiliation_string":"University of Sannio, Benevento#TAB#","institution_ids":["https://openalex.org/I16337185"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5098042678"],"corresponding_institution_ids":["https://openalex.org/I16337185"],"apc_list":null,"apc_paid":null,"fwci":0.7913,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84050703,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"525","last_page":"526"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/disk-formatting","display_name":"Disk formatting","score":0.8360491991043091},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7967884540557861},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.7424982786178589},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.7368627786636353},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.6921892166137695},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.5331681966781616},{"id":"https://openalex.org/keywords/style","display_name":"Style (visual arts)","score":0.46590954065322876},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4418061375617981},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4163699448108673},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41300472617149353},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3558352589607239},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.3516038656234741},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.332084059715271},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.16908490657806396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16763952374458313},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.160414457321167},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12078079581260681},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.08924686908721924}],"concepts":[{"id":"https://openalex.org/C88006597","wikidata":"https://www.wikidata.org/wiki/Q690117","display_name":"Disk formatting","level":2,"score":0.8360491991043091},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7967884540557861},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.7424982786178589},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.7368627786636353},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.6921892166137695},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.5331681966781616},{"id":"https://openalex.org/C2776445246","wikidata":"https://www.wikidata.org/wiki/Q1792644","display_name":"Style (visual arts)","level":2,"score":0.46590954065322876},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4418061375617981},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4163699448108673},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41300472617149353},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3558352589607239},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.3516038656234741},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.332084059715271},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.16908490657806396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16763952374458313},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.160414457321167},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12078079581260681},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.08924686908721924},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsm.2007.4362682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2007.4362682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE International Conference on Software Maintenance","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2056056700","https://openalex.org/W2077155146","https://openalex.org/W2152474046","https://openalex.org/W2156050524","https://openalex.org/W3141465105"],"related_works":["https://openalex.org/W1986222079","https://openalex.org/W4389156480","https://openalex.org/W2019257047","https://openalex.org/W2556186360","https://openalex.org/W2795746234","https://openalex.org/W4319165526","https://openalex.org/W2729258247","https://openalex.org/W4380568682","https://openalex.org/W4389707997","https://openalex.org/W2785752813"],"abstract_inverted_index":{"The":[0],"quality":[1],"of":[2,24],"identifiers,":[3],"the":[4,22,34,63],"coding":[5,51],"style":[6,52],"and":[7,16,27,32,58],"formatting":[8],"are":[9],"important":[10],"aspects":[11],"that":[12,46],"influence":[13],"program":[14],"understandings":[15],"maintenance.":[17],"This":[18,38],"is":[19],"confirmed":[20],"by":[21],"presence":[23],"several":[25],"approaches":[26],"tools":[28],"aimed":[29],"at":[30],"supporting":[31],"improving":[33],"source":[35,56],"code":[36,64],"quality.":[37],"paper":[39],"describes":[40],"a":[41],"tool":[42],"named":[43],"Smart":[44],"Formatter":[45],"allows":[47],"programmers":[48],"to":[49,62],"learn":[50],"rules":[53,61],"from":[54],"existing":[55],"code,":[57],"apply":[59],"these":[60],"under":[65],"development.":[66]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
