{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:47:32Z","timestamp":1763664452909,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Education Innovation Research Team","award":["IRT_17R86"],"award-info":[{"award-number":["IRT_17R86"]}]},{"name":"National Key R&D Program of China","award":["2018YFB0803501"],"award-info":[{"award-number":["2018YFB0803501"]}]},{"name":"National Natural Science Foundation of China","award":["61632015, 61772408, U1766215, 61721002, 61532015, 61833015"],"award-info":[{"award-number":["61632015, 61772408, U1766215, 61721002, 61532015, 61833015"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416619","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"758-770","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Exploring the architectural impact of possible dependencies in Python software"],"prefix":"10.1145","author":[{"given":"Wuxia","family":"Jin","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Yuanfang","family":"Cai","sequence":"additional","affiliation":[{"name":"Drexel University"}]},{"given":"Rick","family":"Kazman","sequence":"additional","affiliation":[{"name":"University of Hawaii"}]},{"given":"Gang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Emergent Design Inc, Shanghai, China"}]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597103"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2816707.2816717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_9"},{"key":"e_1_3_2_1_4_1","unstructured":"ArchDia. 2004--2020. https:\/\/archdia.com."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.41"},{"key":"e_1_3_2_1_6_1","volume-title":"Aggressive type inference. language 1050","author":"Aycock John","year":"2000","unstructured":"John Aycock. 2000. Aggressive type inference. language 1050 (2000), 18."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2366.001.0001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486879"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009783721306"},{"key":"e_1_3_2_1_10_1","volume-title":"WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster computing 5, 2","author":"Chatterjee Mainak","year":"2002","unstructured":"Mainak Chatterjee, Sajal K Das, and Damla Turgut. 2002. WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster computing 5, 2 (2002), 193--204."},{"key":"e_1_3_2_1_11_1","volume-title":"An Empirical Study on Dynamic Typing Related Practices in Python Systems. In 2020 IEEE\/ACM 28th International Conference on Program Comprehension (ICPC). -.","author":"Chen Zhifei","year":"2020","unstructured":"Zhifei Chen, Yanhui Li, Bihuan Chen, Wanwangying Ma, Len Chen, and Baowen Xu. 2020. An Empirical Study on Dynamic Typing Related Practices in Python Systems. In 2020 IEEE\/ACM 28th International Conference on Program Comprehension (ICPC). -."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2892643"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00069"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00017"},{"key":"e_1_3_2_1_15_1","unstructured":"Python docs. 2001--2020. https:\/\/docs.python.org\/3\/glossary.html#term-duck-typing."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529700"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738508"},{"key":"e_1_3_2_1_18_1","unstructured":"Erich Gamma. 1995. Design patterns: elements of reusable object-oriented software. Pearson Education India."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693106"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100123"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236051"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03237-0_17"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00040"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9369-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321742"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240483"},{"key":"e_1_3_2_1_27_1","unstructured":"Lattix. 2004--2020. https:\/\/www.sdcsystems.com\/tools\/lattix-software\/lattix-architect\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.29"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1475"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.136"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2671865"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0552"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405348"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162069"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00045"},{"volume-title":"Agile software development: principles, patterns, and practices","author":"Martin Robert C","key":"e_1_3_2_1_36_1","unstructured":"Robert C Martin. 2002. Agile software development: principles, patterns, and practices. Prentice Hall."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.10"},{"key":"e_1_3_2_1_38_1","unstructured":"Mltilang-depends. 2018--2020. https:\/\/github.com\/multilang-depends\/depends."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2015.12"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884825"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2910856"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240467"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.90"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155578"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/117954.117965"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.62"},{"key":"e_1_3_2_1_48_1","volume-title":"Using information retrieval based coupling measures for impact analysis. Empirical software engineering 14, 1","author":"Poshyvanyk Denys","year":"2009","unstructured":"Denys Poshyvanyk, Andrian Marcus, Rudolf Ferenc, and Tibor Gyim\u00f3thy. 2009. Using information retrieval based coupling measures for impact analysis. Empirical software engineering 14, 1 (2009), 5--32."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.26"},{"key":"e_1_3_2_1_50_1","unstructured":"Python. 2001--2020. https:\/\/docs.python.org\/3.7\/library\/trace.html."},{"key":"e_1_3_2_1_51_1","unstructured":"Python. 2001--2020. https:\/\/www.python.org\/dev\/peps\/pep-0484\/."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635922"},{"volume-title":"Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications. 944--953.","author":"Rigo Armin","key":"e_1_3_2_1_53_1","unstructured":"Armin Rigo and Samuele Pedroni. 2006. PyPy's approach to virtual machine construction. In Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications. 944--953."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115680"},{"key":"e_1_3_2_1_55_1","unstructured":"Structure101. 2004--2020. https:\/\/structure101.com\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393656"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891477"},{"key":"e_1_3_2_1_58_1","unstructured":"SciTools Understand. 1996--2020. https:\/\/scitools.com\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Beibei Wang Lin Chen Wanwangying Ma Zhifei Chen and Baowen Xu. 2015. An empirical study on the impact of Python dynamic features on change-proneness. In SEKE. 134--139.","DOI":"10.18293\/SEKE2015-097"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings. 12th IEEE International Workshop on Program Comprehension","author":"Wen Zhihua","year":"2004","unstructured":"Zhihua Wen and Vassilios Tzerpos. 2004. An effectiveness measure for software clustering algorithms. In Proceedings. 12th IEEE International Workshop on Program Comprehension, 2004. IEEE, 194--203."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985850"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.53"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568241"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884822"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950343"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.52"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":68,"alternative-id":["10.1145\/3324884.3416619","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416619","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}