{"id":"https://openalex.org/W2006291142","doi":"https://doi.org/10.1145/2786805.2786855","title":"How developers search for code: a case study","display_name":"How developers search for code: a case study","publication_year":2015,"publication_date":"2015-08-26","ids":{"openalex":"https://openalex.org/W2006291142","doi":"https://doi.org/10.1145/2786805.2786855","mag":"2006291142"},"language":"en","primary_location":{"id":"doi:10.1145/2786805.2786855","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2786805.2786855","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2786805.2786855","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/2786805.2786855","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013989748","display_name":"Caitlin Sadowski","orcid":"https://orcid.org/0000-0002-7742-2784"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Caitlin Sadowski","raw_affiliation_strings":["Google, USA"],"affiliations":[{"raw_affiliation_string":"Google, USA","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050283470","display_name":"Kathryn T. Stolee","orcid":"https://orcid.org/0000-0003-0584-7094"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kathryn T. Stolee","raw_affiliation_strings":["Iowa State University, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025318877","display_name":"Sebastian Elbaum","orcid":"https://orcid.org/0000-0001-9592-1352"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sebastian Elbaum","raw_affiliation_strings":["University of Nebraska-Lincoln, USA"],"affiliations":[{"raw_affiliation_string":"University of Nebraska-Lincoln, USA","institution_ids":["https://openalex.org/I114395901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013989748"],"corresponding_institution_ids":["https://openalex.org/I1291425158"],"apc_list":null,"apc_paid":null,"fwci":30.4672,"has_fulltext":true,"cited_by_count":240,"citation_normalized_percentile":{"value":0.99548694,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"191","last_page":"201"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11675","display_name":"Open Source Software Innovations","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8024241924285889},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6313823461532593},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.6293702721595764},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5551618337631226},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.5039615035057068},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4954792261123657},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4901340901851654},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.43271946907043457},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.41774508357048035},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.38467395305633545},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.34014713764190674},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3019155263900757},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11758369207382202}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8024241924285889},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6313823461532593},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.6293702721595764},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5551618337631226},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.5039615035057068},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4954792261123657},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4901340901851654},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.43271946907043457},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41774508357048035},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.38467395305633545},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.34014713764190674},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3019155263900757},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11758369207382202},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2786805.2786855","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2786805.2786855","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2786805.2786855","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2786805.2786855","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2786805.2786855","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2786805.2786855","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4049666403","display_name":null,"funder_award_id":"EAGER","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6027992628","display_name":"SHF: EAGER: Collaborative Research: Demonstrating the Feasibility of Automatic Program Repair Guided by Semantic Code Search","funder_award_id":"1446932","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320311090","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2006291142.pdf","grobid_xml":"https://content.openalex.org/works/W2006291142.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W41491511","https://openalex.org/W1504010215","https://openalex.org/W1951734032","https://openalex.org/W1977971855","https://openalex.org/W1993786160","https://openalex.org/W2031289572","https://openalex.org/W2060055745","https://openalex.org/W2064296229","https://openalex.org/W2080579313","https://openalex.org/W2084887015","https://openalex.org/W2102235124","https://openalex.org/W2110220994","https://openalex.org/W2122401044","https://openalex.org/W2134092629","https://openalex.org/W2139374478","https://openalex.org/W2147426111","https://openalex.org/W2151996389","https://openalex.org/W2160570190","https://openalex.org/W2164961799","https://openalex.org/W2180107243","https://openalex.org/W2492006053"],"related_works":["https://openalex.org/W3153702491","https://openalex.org/W4318539024","https://openalex.org/W2969257295","https://openalex.org/W3008981372","https://openalex.org/W2206096527","https://openalex.org/W4226317003","https://openalex.org/W2069798959","https://openalex.org/W2149635184","https://openalex.org/W2151979607","https://openalex.org/W4246032972"],"abstract_inverted_index":{"With":[0],"the":[1],"advent":[2],"of":[3,44,94],"large":[4],"code":[5,11,33,88,113,121,143,151],"repositories":[6],"and":[7,46,58,71,115],"sophisticated":[8],"search":[9,12,31,67,74,86,96,105],"capabilities,":[10],"is":[13,147,152],"increasingly":[14],"becoming":[15],"a":[16,35,42,65,73,111],"key":[17],"software":[18],"development":[19],"activity.":[20],"In":[21],"this":[22],"work":[23],"we":[24],"shed":[25],"some":[26],"light":[27],"into":[28,53],"how":[29,137],"developers":[30,55],"for":[32,87,120],"through":[34],"case":[36],"study":[37,50],"performed":[38],"at":[39,110],"Google,":[40],"using":[41],"combination":[43],"survey":[45],"log-analysis":[47],"methodologies.":[48],"Our":[49,81],"provides":[51],"insights":[52],"what":[54,72,142],"are":[56,107,117,125,130],"doing":[57],"trying":[59],"to":[60,134,138],"learn":[61],"when":[62],"per-":[63],"forming":[64],"search,":[66],"scope,":[68],"query":[69],"properties,":[70],"session":[75],"under":[76],"different":[77],"contexts":[78],"usually":[79],"entails.":[80],"results":[82],"indicate":[83],"that":[84],"programmers":[85,116,129],"very":[89],"frequently,":[90],"conducting":[91],"an":[92,140],"average":[93],"five":[95],"sessions":[97],"with":[98,122],"12":[99],"total":[100],"queries":[101,106],"each":[102],"workday.":[103],"The":[104],"often":[108],"targeted":[109],"particular":[112],"location":[114],"typically":[118],"looking":[119],"which":[123],"they":[124],"somewhat":[126],"familiar.":[127],"Further,":[128],"generally":[131],"seeking":[132],"answers":[133],"questions":[135],"about":[136],"use":[139],"API,":[141],"does,":[144],"why":[145],"something":[146],"failing,":[148],"or":[149],"where":[150],"located.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":23},{"year":2021,"cited_by_count":37},{"year":2020,"cited_by_count":33},{"year":2019,"cited_by_count":53},{"year":2018,"cited_by_count":19},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
