{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:17Z","timestamp":1750220897881,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1553741"],"award-info":[{"award-number":["CCF-1553741"]}]},{"name":"NSERC","award":["RGPIN2018-05095"],"award-info":[{"award-number":["RGPIN2018-05095"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409725","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:43:06Z","timestamp":1607647386000},"page":"629-641","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Understanding type changes in Java"],"prefix":"10.1145","author":[{"given":"Ameya","family":"Ketkar","sequence":"first","affiliation":[{"name":"Oregon State University, USA"}]},{"given":"Nikolaos","family":"Tsantalis","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Danny","family":"Dig","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_2_2_1","volume-title":"Mohamed Wiem Mkaouer, and Ali Ouni","author":"Alrubaye Hussein","year":"2019","unstructured":"Hussein Alrubaye , Deema AlShoaibi , Mohamed Wiem Mkaouer, and Ali Ouni . 2019 . How Does API Migration Impact Software Quality and Comprehension? An Empirical Study . (Jul 2019 ). https:\/\/arxiv.org\/abs\/ 1907.07724 Hussein Alrubaye, Deema AlShoaibi, Mohamed Wiem Mkaouer, and Ali Ouni. 2019. How Does API Migration Impact Software Quality and Comprehension? An Empirical Study. (Jul 2019 ). https:\/\/arxiv.org\/abs\/ 1907.07724"},{"key":"e_1_3_2_2_3_1","first-page":"60","volume-title":"Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering (Markham, Ontario, Canada) ( CASCON '18). IBM Corp.","author":"Alrubaye Hussein","year":"2018","unstructured":"Hussein Alrubaye and Mohamed Wiem Mkaouer . 2018 . Automating the Detection of Third-party Java Library Migration at the Function Level . In Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering (Markham, Ontario, Canada) ( CASCON '18). IBM Corp. , Riverton, NJ, USA , 60 - 71 . http:\/\/dl.acm.org\/citation.cfm?id= 3291291. 3291299 Hussein Alrubaye and Mohamed Wiem Mkaouer. 2018. Automating the Detection of Third-party Java Library Migration at the Function Level. In Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering (Markham, Ontario, Canada) ( CASCON '18). IBM Corp., Riverton, NJ, USA, 60-71. http:\/\/dl.acm.org\/citation.cfm?id= 3291291. 3291299"},{"key":"e_1_3_2_2_4_1","unstructured":"Apache. 2019. efective-pom.  Apache. 2019. efective-pom."},{"key":"e_1_3_2_2_5_1","unstructured":"Apache. 2019. Netbeans Refactoring.  Apache. 2019. Netbeans Refactoring."},{"key":"e_1_3_2_2_6_1","unstructured":"Apache. 2019. Visual Studio-Refactor code.  Apache. 2019. Visual Studio-Refactor code."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312942"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094832"},{"key":"e_1_3_2_2_9_1","volume-title":"Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts. (Aug 2018 ). https:\/\/arxiv.org\/abs\/","author":"Bavishi Rohan","year":"1809","unstructured":"Rohan Bavishi , Michael Pradel , and Koushik Sen . 2018. Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts. (Aug 2018 ). https:\/\/arxiv.org\/abs\/ 1809 .05193 Rohan Bavishi, Michael Pradel, and Koushik Sen. 2018. Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts. (Aug 2018 ). https:\/\/arxiv.org\/abs\/ 1809.05193"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338952"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240715"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106259"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131151.3131171"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565039"},{"key":"e_1_3_2_2_15_1","unstructured":"Guacamole Client. 2011. commit with type change. https:\/\/tinyurl.com\/yx2npj8g  Guacamole Client. 2011. commit with type change. https:\/\/tinyurl.com\/yx2npj8g"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393661"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449790"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070565"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236042"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747226"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.328"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070539"},{"key":"e_1_3_2_2_24_1","unstructured":"Guava Documentation. 2019. ImmutableList.  Guava Documentation. 2019. ImmutableList."},{"key":"e_1_3_2_2_25_1","unstructured":"Java Platform Documentation. 2019. Autoboxing and unboxing.  Java Platform Documentation. 2019. Autoboxing and unboxing."},{"key":"e_1_3_2_2_26_1","unstructured":"Java Platform Documentation. 2019. DeQue.  Java Platform Documentation. 2019. DeQue."},{"key":"e_1_3_2_2_27_1","unstructured":"Java Platform Documentation. 2019. LinkedList.  Java Platform Documentation. 2019. LinkedList."},{"key":"e_1_3_2_2_28_1","unstructured":"Java Platform Documentation. 2019. List.  Java Platform Documentation. 2019. List."},{"key":"e_1_3_2_2_29_1","unstructured":"Java Platform Documentation. 2019. Map.  Java Platform Documentation. 2019. Map."},{"key":"e_1_3_2_2_30_1","unstructured":"Java Platform Documentation. 2019. SecureRandom.  Java Platform Documentation. 2019. SecureRandom."},{"key":"e_1_3_2_2_31_1","unstructured":"Java Platform Documentation. 2019. Set.  Java Platform Documentation. 2019. Set."},{"key":"e_1_3_2_2_32_1","unstructured":"Java Platform Documentation. 2019. StringBufer.  Java Platform Documentation. 2019. StringBufer."},{"key":"e_1_3_2_2_33_1","unstructured":"Java Platform Documentation. 2019. StringBuilder.  Java Platform Documentation. 2019. StringBuilder."},{"key":"e_1_3_2_2_34_1","unstructured":"Java Platform Documentation. 2019. Widening Primitive Conversion.  Java Platform Documentation. 2019. Widening Primitive Conversion."},{"key":"e_1_3_2_2_35_1","unstructured":"Eclipse. 2019. Refactoring Actions.  Eclipse. 2019. Refactoring Actions."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330571"},{"key":"e_1_3_2_2_38_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma Erich","year":"1994","unstructured":"Erich Gamma , Richard Helm , Ralph Johnson , and John Vlissides . 1994 . Design Patterns: Elements of Reusable Object-Oriented Software . Addison-Wesley Professional . Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. 1994. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Professional."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606554"},{"key":"e_1_3_2_2_40_1","unstructured":"Google. 2011. Error Prone. https:\/\/github.com\/google\/error-prone  Google. 2011. Error Prone. https:\/\/github.com\/google\/error-prone"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062512"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332471"},{"key":"e_1_3_2_2_43_1","unstructured":"Eclipse JDT. 2019. Type.  Eclipse JDT. 2019. Type."},{"key":"e_1_3_2_2_44_1","unstructured":"JetBrains. 2019. IntelliJ-Refactoring Code.  JetBrains. 2019. IntelliJ-Refactoring Code."},{"key":"e_1_3_2_2_45_1","unstructured":"JetBrains. 2019. Type Migration.  JetBrains. 2019. Type Migration."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2016.025"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3906493"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3906503"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00117"},{"key":"e_1_3_2_2_50_1","unstructured":"Ameya Ketkar Nikolaos Tsantalis and Danny Dig. 2019. Type Facts Companion website.  Ameya Ketkar Nikolaos Tsantalis and Danny Dig. 2019. Type Facts Companion website."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.16"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9521-5"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678015.2682534"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133909"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.18"},{"key":"e_1_3_2_2_57_1","first-page":"502","volume-title":"Proceedings of the 2013 International Conference on Software Engineering (San Francisco, CA, USA) ( ICSE '13). IEEE Press","author":"Meng Na","unstructured":"Na Meng , Miryung Kim , and Kathryn S . McKinley. 2013. LASE: Locating and Applying Systematic Edits by Learning from Examples . In Proceedings of the 2013 International Conference on Software Engineering (San Francisco, CA, USA) ( ICSE '13). IEEE Press , Piscataway, NJ, USA , 502 - 511 . http:\/\/dl.acm.org\/citation.cfm? id= 2486788. 2486855 Na Meng, Miryung Kim, and Kathryn S. McKinley. 2013. LASE: Locating and Applying Systematic Edits by Learning from Examples. In Proceedings of the 2013 International Conference on Software Engineering (San Francisco, CA, USA) ( ICSE '13). IEEE Press, Piscataway, NJ, USA, 502-511. http:\/\/dl.acm.org\/citation.cfm? id= 2486788. 2486855"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340455"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_23"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568317"},{"key":"e_1_3_2_2_62_1","unstructured":"Netbeans. 2011. Netbeans-Jackpot wiki. http:\/\/wiki.netbeans.org\/Jackpot  Netbeans. 2011. Netbeans-Jackpot wiki. http:\/\/wiki.netbeans.org\/Jackpot"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950333"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00089"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1932682.1869486"},{"volume-title":"Principles of Program Analysis","author":"Nielson Flemming","key":"e_1_3_2_2_66_1","unstructured":"Flemming Nielson , Hanne R. Nielson , and Chris Hankin . 2010. Principles of Program Analysis . Springer Publishing Company, Inc orporated. Flemming Nielson, Hanne R. Nielson, and Chris Hankin. 2010. Principles of Program Analysis. Springer Publishing Company, Incorporated."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080814"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806832"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609577"},{"key":"e_1_3_2_2_70_1","unstructured":"The Joda project. 2019. Joda-Time.  The Joda project. 2019. Joda-Time."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199195"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.63"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9150-8"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.44"},{"key":"e_1_3_2_2_75_1","unstructured":"Reudismam Rolim Gustavo Soares Rohit Gheyi and Loris D'Antoni. 2018. Learning Quick Fixes from Code Repositories. ( 2018 ). http:\/\/arxiv.org\/abs\/ 1803.03806  Reudismam Rolim Gustavo Soares Rohit Gheyi and Loris D'Antoni. 2018. Learning Quick Fixes from Code Repositories. ( 2018 ). http:\/\/arxiv.org\/abs\/ 1803.03806"},{"key":"e_1_3_2_2_76_1","unstructured":"John Rose. 2019. Value Objects.  John Rose. 2019. Value Objects."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2968072"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950305"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.14"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321688"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1660"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961204.1961205"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007722"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1838"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106289"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806848"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101919"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70747"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00052"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Virtual Event USA","acronym":"ESEC\/FSE '20"},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409725","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:40Z","timestamp":1750203880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":90,"alternative-id":["10.1145\/3368089.3409725","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409725","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}