{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:08:41Z","timestamp":1759032521271,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T00:00:00Z","timestamp":1470268800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10664-016-9444-6","type":"journal-article","created":{"date-parts":[[2016,8,3]],"date-time":"2016-08-03T23:11:10Z","timestamp":1470265870000},"page":"1348-1371","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["fine-GRAPE: fine-grained APi usage extractor \u2013 an approach and dataset to investigate API usage"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5816-8020","authenticated-orcid":false,"given":"Anand Ashok","family":"Sawant","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"key":"9444_CR1","unstructured":"Agrawal R, Srikant R et al. (1994) Fast algorithms for mining association rules. In: Proceedings of the 20th international conference on very large data bases, vol 1215 of VLDB 1994, pp 487\u2013499"},{"key":"9444_CR2","doi-asserted-by":"crossref","unstructured":"Bacchelli A, Ciancarini P, Rossi D (2008) On the effectiveness of manual and automatic unit test generation. In: The third international conference on software engineering advances, ICSEA 2008. IEEE, pp 252\u2013 257","DOI":"10.1109\/ICSEA.2008.66"},{"key":"9444_CR3","doi-asserted-by":"crossref","unstructured":"Bajracharya S, Ngo T, Linstead E, Dou Y, Rigor P, Baldi P, Lopes C (2006) Sourcerer: a search engine for open source code supporting structure-based search. In: Companion to the 21st ACM SIGPLAN symposium on object-oriented programming systems, languages, and applications. ACM, pp 681\u2013 682","DOI":"10.1145\/1176617.1176671"},{"key":"9444_CR4","doi-asserted-by":"crossref","unstructured":"Barr ET, Bird C, Rigby PC, Hindle A, German DM, Devanbu P (2012) Cohesive and isolated development with branches. In: Fundamental approaches to software engineering. Springer, pp 316\u2013331","DOI":"10.1007\/978-3-642-28872-2_22"},{"key":"9444_CR5","unstructured":"Bruneton E, Lenglet R, Coupaye T (2002) Asm: a code manipulation tool to implement adaptable systems. Adaptable and extensible component systems 30"},{"key":"9444_CR6","doi-asserted-by":"crossref","unstructured":"Chacon S (2009) Pro git. Apress","DOI":"10.1007\/978-1-4302-1834-0"},{"issue":"10","key":"9444_CR7","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/1449955.1449790","volume":"43","author":"B Dagenais","year":"2008","unstructured":"Dagenais B, Hendren L (2008) Enabling static analysis for partial java programs. ACM Sigplan Notices 43(10):313\u2013328","journal-title":"ACM Sigplan Notices"},{"issue":"2","key":"9444_CR8","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1002\/smr.328","volume":"18","author":"D Dig","year":"2006","unstructured":"Dig D, Johnson R (2006) How do APIs evolve? A story of refactoring. J Softw Maint Evol Res Pract 18(2):83\u2013107","journal-title":"J Softw Maint Evol Res Pract"},{"key":"9444_CR9","unstructured":"Ducasse S, Lanza M, Tichelaar S (2000) Moose: an extensible language-independent environment for reengineering object-oriented systems. In: Proceedings of the 2nd international symposium symposium on constructing software engineering tools, CoSET 2000"},{"key":"9444_CR10","unstructured":"Ester M, Kriegel H.-P, Sander J, Xu X, et al. (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd, vol 96, pp 226\u2013231"},{"key":"9444_CR11","doi-asserted-by":"crossref","unstructured":"Gousios G, Vasilescu B, Serebrenik A, Zaidman A (2014) Lean ghtorrent: Github data on demand. In: Proceedings of the 11th working conference on mining software repositories, MSR. ACM, pp 384\u2013 387","DOI":"10.1145\/2597073.2597126"},{"key":"9444_CR12","doi-asserted-by":"crossref","unstructured":"Henkel J, Diwan A (2005) Catchup!: capturing and replaying refactorings to support API evolution. In: Proceedings of the 27th international conference on software engineering, ICSE 2005. ACM, pp 274\u2013 283","DOI":"10.1145\/1062455.1062512"},{"issue":"2","key":"9444_CR13","first-page":"22","volume":"1","author":"RE Johnson","year":"1988","unstructured":"Johnson RE, Foote B (1988) Designing reusable classes. Journal of Object-Oriented Programming 1(2):22\u2013 35","journal-title":"Journal of Object-Oriented Programming"},{"key":"9444_CR14","doi-asserted-by":"crossref","unstructured":"Kalliamvakou E, Gousios G, Blincoe K, Singer L, German DM, Damian D (2014) The promises and perils of mining github. In: Proceedings of the 11th working conference on mining software repositories, MSR 2014. ACM, pp 92\u2013101","DOI":"10.1145\/2597073.2597074"},{"key":"9444_CR15","doi-asserted-by":"crossref","unstructured":"Kula R G, De Roover C, German D, Ishio T, Inoue K (2014) Visualizing the evolution of systems and their library dependencies. In: Software Visualization (VISSOFT), 2014 Second IEEE Working Conference on, IEEE, pp 127\u2013136","DOI":"10.1109\/VISSOFT.2014.29"},{"key":"9444_CR16","doi-asserted-by":"crossref","unstructured":"L\u00e4mmel R, Pek E, Starek J (2011) Large-scale, ast-based API-usage analysis of open-source java projects. In: Proceedings of the 26th ACM symposium on applied computing, SAC 2011, pp 1317\u20131324","DOI":"10.1145\/1982185.1982471"},{"issue":"5","key":"9444_CR17","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1145\/1095430.1081755","volume":"30","author":"Z Li","year":"2005","unstructured":"Li Z, Zhou Y (2005) Pr-miner: automatically extracting implicit programming rules and detecting violations in large software code. ACM SIGSOFT Software Engineering Notes 30(5):306\u2013315","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"issue":"5","key":"9444_CR18","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1145\/1095430.1081754","volume":"30","author":"B Livshits","year":"2005","unstructured":"Livshits B, Zimmermann T (2005) Dynamine: finding common error patterns by mining software revision histories. ACM SIGSOFT Software Engineering Notes 30 (5):296\u2013305","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"9444_CR19","unstructured":"Mandelin D, Kimelman D (2006) Jungloid mining: helping to navigate the API jungle. Synthesis:48\u201361"},{"key":"9444_CR20","doi-asserted-by":"crossref","unstructured":"McDonnell T, Ray B, Kim M (2013) An empirical study of API stability and adoption in the android ecosystem. In: Proceedings of the 29th international conference on software maintenance, ICSM 2013. IEEE, pp 70\u201379","DOI":"10.1109\/ICSM.2013.18"},{"key":"9444_CR21","doi-asserted-by":"crossref","unstructured":"Michail A (1999) Data mining library reuse patterns in user-selected applications. In: Proceedings of 14th IEEE international conference on automated software engineering, 1999, ASE 1999. IEEE, pp 24\u201333","DOI":"10.1109\/ASE.1999.802089"},{"key":"9444_CR22","doi-asserted-by":"crossref","unstructured":"Mileva YM, Dallmeier V, Zeller A (2010) Mining API popularity. In: Testing\u2013practice and research techniques. Springer, pp 173\u2013180","DOI":"10.1007\/978-3-642-15585-7_17"},{"key":"9444_CR23","unstructured":"Momjian B (2001) PostgreSQL: introduction and concepts, vol 192. Addison-Wesley, New York"},{"key":"9444_CR24","doi-asserted-by":"crossref","unstructured":"Moreno L, Bavota G, Di Penta M, Oliveto R, Marcus A (2015) How can i use this method?. In: Proceedings of the 37th International conference on Software engineering, MSR 2015, p in press","DOI":"10.1109\/ICSE.2015.98"},{"key":"9444_CR25","doi-asserted-by":"crossref","unstructured":"Ponzanelli L, Bacchelli A, Lanza M (2013) Seahawk: stack overflow in the IDE. In: Proceedings of the 35th international conference on software engineering, tool demo track, ICSE 2013. IEEE CS Press, pp 1295\u20131298","DOI":"10.1109\/ICSE.2013.6606701"},{"key":"9444_CR26","unstructured":"Primat O (2013) Github\u2019s 10,000 most popular java projects \u2013 here are the top libraries they use. http:\/\/blog.takipi.com\/githubs-10000-most-popular-java-projects-here-are-the-top-libraries-they-use\/"},{"issue":"6","key":"9444_CR27","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1007\/s10664-010-9150-8","volume":"16","author":"MP Robillard","year":"2011","unstructured":"Robillard MP, DeLine R (2011) A field study of API learning obstacles. Empir Softw Eng 16(6):703\u2013732","journal-title":"Empir Softw Eng"},{"key":"9444_CR28","doi-asserted-by":"crossref","unstructured":"Saini V, Sajnani H, Ossher J, Lopes CV (2014) A dataset for maven artifacts and bug patterns found in them. In: Proceedings of the 11th working conference on mining software repositories. ACM, pp 416\u2013419","DOI":"10.1145\/2597073.2597134"},{"key":"9444_CR29","doi-asserted-by":"crossref","unstructured":"Saied MA, Benomar O, Abdeen H, Sahraoui H (2015) Mining multi-level API usage patterns. In: 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), IEEE, pp 23\u201332","DOI":"10.1109\/SANER.2015.7081812"},{"key":"9444_CR30","doi-asserted-by":"publisher","unstructured":"Sawant A, Bacchelli A (2015a) Api usage databases. doi: http:\/\/dx.doi.org\/10.6084\/m9.figshare.1320591","DOI":"10.6084\/m9.figshare.1320591"},{"key":"9444_CR31","doi-asserted-by":"crossref","unstructured":"Sawant A, Bacchelli A (2015b) A dataset for API usage. In: Proceedings of the 12th working conference on mining software repositories, MSR 2015. IEEE Press, pp 506\u2013509","DOI":"10.1109\/MSR.2015.75"},{"key":"9444_CR32","doi-asserted-by":"crossref","unstructured":"Thummalapenta S, Xie T (2008) Spotweb: Detecting framework hotspots and coldspots via mining open source code on the web. In: Proceedings of the 23rd IEEE\/ACM international conference on automated software engineering, ASE 2008, pp 327\u2013336","DOI":"10.1109\/ASE.2008.43"},{"key":"9444_CR33","doi-asserted-by":"crossref","unstructured":"Thummalapenta S, Xie T (2009) Alattin: Mining alternative patterns for detecting neglected conditions. In: Proceedings of the 2009 IEEE\/ACM international conference on automated software engineering, ASE 2009. IEEE Computer Society, pp 283\u2013294","DOI":"10.1109\/ASE.2009.72"},{"key":"9444_CR34","unstructured":"Tiobe index (2015) http:\/\/www.tiobe.com\/index.php\/content\/paperinfo\/tpci\/index.html . accessed on 16 October"},{"key":"9444_CR35","doi-asserted-by":"crossref","unstructured":"Uddin G, Dagenais B, Robillard M P (2012) Temporal analysis of API usage concepts. In: Proceedings of the 34th International Conference on Software Engineering, IEEE Press, pp 804\u2013814","DOI":"10.1109\/ICSE.2012.6227138"},{"key":"9444_CR36","unstructured":"Vogel L Eclipse JDT-Abstract Syntax Tree (AST) and the java model-tutorial. http:\/\/www.vogella.com\/tutorials\/EclipseJDT\/article.html"},{"key":"9444_CR37","doi-asserted-by":"crossref","unstructured":"Wang J, Dang Y, Zhang H, Chen K, Xie T, Zhang D (2013) Mining succinct and high-coverage API usage patterns from source code. In: Proceedings of the 10th working conference on mining software repositories, MSR 2013. IEEE Press, pp 319\u2013328","DOI":"10.1109\/MSR.2013.6624045"},{"key":"9444_CR38","doi-asserted-by":"crossref","unstructured":"Wasylkowski A, Zeller A, Lindig C (2007) Detecting object usage anoMalies. In: Proceedings of the 6th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, vol 07 of ESEC\/FSE 2007, pp 35\u201344","DOI":"10.1145\/1287624.1287632"},{"key":"9444_CR39","doi-asserted-by":"crossref","unstructured":"Xie T, Pei J (2006) Mapo: mining API usages from open source repositories. In: Proceedings of the 3rd working conference on mining software repositories, MSR 2006, pp 54\u201357","DOI":"10.1145\/1137983.1137997"},{"key":"9444_CR40","doi-asserted-by":"crossref","unstructured":"Zhong H, Xie T, Zhang L, Pei J, Mei H (2009) Mapo: Mining and recommending API usage patterns. In: Proceedings of the 23rd european conference on object-oriented programming, ECOOP 2009. Springer, pp 318\u2013343","DOI":"10.1007\/978-3-642-03013-0_15"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9444-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9444-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9444-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9444-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,6]],"date-time":"2017-06-06T15:15:29Z","timestamp":1496762129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9444-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,4]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9444"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9444-6","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2016,8,4]]}}}