{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:35:37Z","timestamp":1753601737699,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/saner.2019.8668018","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T21:30:10Z","timestamp":1552944610000},"page":"117-127","source":"Crossref","is-referenced-by-count":9,"title":["How Stable Are Eclipse Application Framework Internal Interfaces?"],"prefix":"10.1109","author":[{"given":"John","family":"Businge","sequence":"first","affiliation":[]},{"given":"Simon","family":"Kawuma","sequence":"additional","affiliation":[]},{"given":"Moses","family":"Openja","sequence":"additional","affiliation":[]},{"given":"Engineer","family":"Bainomugisha","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Serebrenik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9411-7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9554-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007601015854"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3127005.3127009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1862372.1862389"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081844"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.30"},{"key":"ref28","article-title":"On the overestimation of random forest&#x2019;s out-of-bag error","volume":"204","author":"janitza","year":"2017"},{"key":"ref27","first-page":"301","article-title":"What are the characteristics of high-rated apps? a case study on free android applications","author":"tian","year":"2015","journal-title":"ICSM"},{"key":"ref29","article-title":"Studying android app popularity by cross-linking github and google play store","author":"businge","year":"2019","journal-title":"SANE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.151"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235416"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.54"},{"journal-title":"Provisional api guidelines update proposal","year":"2018","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"ref26","first-page":"644","article-title":"Ecosystem-level determinants of sustained activity in open-source projects: a case study of the pypi ecosystem","author":"valiev","year":"2018","journal-title":"Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering ESEC\/SIGSOFT FSE 2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950325"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306276"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1723028.1723044"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.infsof.2015.02.014","article-title":"How java apis break&#x2013;an empirical 2015. study","volume":"65","author":"jezek","year":"0","journal-title":"Information and Software Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9221-3"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1145\/2858965.2814313","article-title":"Use at your own risk: the java unsafe api in the wild","volume":"50","author":"mastrangelo","year":"2015","journal-title":"ACM SIGPLAN Notices"},{"key":"ref12","first-page":"54","article-title":"Eclipse API usage: the good and the bad","author":"businge","year":"2012","journal-title":"SQM"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503716"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950306"},{"journal-title":"Evolving Java-based APIs","year":"2018","author":"des rivieres","key":"ref16"},{"key":"ref17","first-page":"115","article-title":"A survey on software clone detection research","volume":"541","author":"roy","year":"2007","journal-title":"Queen&#x2019;s"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1592"},{"journal-title":"Eclipse project archived download","year":"2018","author":"project","key":"ref19"},{"journal-title":"How to Use the Eclipse API","year":"2018","author":"des rivieres","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/2.536783"},{"journal-title":"The jbpm api","year":"2018","author":"jbpm team","key":"ref6"},{"journal-title":"Why developers should not write programs that call &#x2019;sun&#x2019; packages","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368154"},{"journal-title":"JUnit 5 User Guide","year":"2018","author":"bechtold","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1328279.1328293"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405295"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.24"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332471"},{"key":"ref48","first-page":"321","article-title":"apiwave: Keeping track of api popularity and migration","author":"hora","year":"2015","journal-title":"ICSM"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747209"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.18"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330214"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062512"},{"key":"ref43","first-page":"389","author":"dig","year":"2005","journal-title":"The role of refactorings in api evolution"}],"event":{"name":"2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2019,2,24]]},"location":"Hangzhou, China","end":{"date-parts":[[2019,2,27]]}},"container-title":["2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8663526\/8667965\/08668018.pdf?arnumber=8668018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:51:34Z","timestamp":1658141494000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8668018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/saner.2019.8668018","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}