{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:06:55Z","timestamp":1771466815881,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3556960","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3406-5235","authenticated-orcid":false,"given":"Vikram","family":"Nitin","sequence":"first","affiliation":[{"name":"Computer Science, Columbia University, United States of America"}]},{"given":"Shubhi","family":"Asthana","sequence":"additional","affiliation":[{"name":"IBM Research, United States of America"}]},{"given":"Baishakhi","family":"Ray","sequence":"additional","affiliation":[{"name":"Computer Science, Columbia University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5899-6651","authenticated-orcid":false,"given":"Rahul","family":"Krishna","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Transform monolithic Java applications into microservices with the power of AI. https:\/\/developer.ibm.com\/tutorials\/transform-monolithic-java-applications-into-microservices-with-the-power-of-ai\/. Accessed: 2022-05-05."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Upgrading GitHub from Rails 3.2 to 5.2. https:\/\/github.blog\/2018-09-28-upgrading-github-from-rails-3-2-to-5-2\/. Accessed: 2022-05-06."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Upgrading GitHub from Rails 3.2 to 5.2. https:\/\/thenewstack.io\/led-amazon-microservices-architecture\/. Accessed: 2022-05-06."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. What Led Amazon to its Own Microservices Architecture. https:\/\/www.infoq.com\/articles\/github-monolith-microservices\/. Accessed: 2022-05-06."},{"key":"e_1_3_2_1_5_1","unstructured":"acmeair. 2019. acmeair. https:\/\/github.com\/acmeair\/acmeair"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2016.026"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386026"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386026"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67262-5_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9226-8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.53"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i1.16079"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i1.16079"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/STEP.1999.798481"},{"key":"e_1_3_2_1_16_1","volume-title":"Towards the understanding and evolution of monolithic applications as microservices. In 2016 XLII Latin American computing conference (CLEI)","author":"Escobar Daniel","unstructured":"Daniel Escobar, Diana C\u00e1rdenas, Rolando Amarillo, Eddie Castro, Kelly Garc\u00e9s, Carlos Parra, and Rubby Casallas. 2016. Towards the understanding and evolution of monolithic applications as microservices. In 2016 XLII Latin American computing conference (CLEI). IEEE, 1\u201311."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_18_1","unstructured":"Martin Fowler. 2004. Strangler Fig Application. https:\/\/martinfowler.com\/bliki\/StranglerFigApplication.html"},{"key":"e_1_3_2_1_19_1","unstructured":"Martin Fowler. 2006. Inversion of Control Containers and Dependency Injection pattern. http:\/\/www. martinfowler. com\/articles\/injection. html (2006)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44482-6_12"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.25080\/TCWV9851"},{"key":"e_1_3_2_1_22_1","unstructured":"Mark Harman Robert\u00a0M Hierons and Mark Proctor. 2002. A New Representation And Crossover Operator For Search-based Optimization Of Software Modularization.. In GECCO Vol.\u00a02. 1351\u20131358."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.32"},{"key":"e_1_3_2_1_24_1","volume-title":"9th conference on pattern language of programs. 1\u20139.","author":"Hohpe Gregor","year":"2002","unstructured":"Gregor Hohpe and Bobby Woolf. 2002. Enterprise integration patterns. In 9th conference on pattern language of programs. 1\u20139."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"e_1_3_2_1_26_1","first-page":"5","article-title":"Service Candidate Identification from Monolithic Systems based on Execution Traces","volume":"47","author":"Jin W.","year":"2019","unstructured":"W. Jin, T. Liu, Y. Cai, R. Kazman, R. Mo, and Q. Zheng. 2019. Service Candidate Identification from Monolithic Systems based on Execution Traces. IEEE Transactions on Software Engineering 47, 5 (Apr 2019), 1\u201321.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2018.00034"},{"key":"e_1_3_2_1_28_1","volume-title":"Expert one-on-one J2EE design and development","author":"Johnson Rod","unstructured":"Rod Johnson. 2004. Expert one-on-one J2EE design and development. John Wiley & Sons."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417933"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473915"},{"key":"e_1_3_2_1_31_1","unstructured":"KimJongSung. 2013. jPetStore. https:\/\/github.com\/KimJongSung\/jPetStore"},{"key":"e_1_3_2_1_32_1","volume-title":"O\u2019Reilly Media","author":"Kleppmann Martin","unstructured":"Martin Kleppmann. 2017. Designing data-intensive applications: The big ideas behind reliable, scalable, and maintainable systems. \u201d O\u2019Reilly Media, Inc.\u201d."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.38"},{"key":"e_1_3_2_1_34_1","volume-title":"Cetus Users and Compiler Infastructure Workshop (CETUS","author":"Lam Patrick","year":"2011","unstructured":"Patrick Lam, Eric Bodden, Ondrej Lhot\u00e1k, and Laurie Hendren. 2011. The Soot framework for Java program analysis: a retrospective. In Cetus Users and Compiler Infastructure Workshop (CETUS 2011), Vol.\u00a015."},{"key":"e_1_3_2_1_35_1","unstructured":"Alessandra Levcovitz Ricardo Terra and Marco\u00a0Tulio Valente. 2016. Towards a technique for extracting microservices from monolithic enterprise systems. arXiv preprint arXiv:1605.03175(2016)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276511"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236041"},{"key":"e_1_3_2_1_38_1","volume-title":"Agile software development: principles, patterns, and practices. Vol.\u00a02","author":"Martin C","unstructured":"Robert\u00a0C Martin, James Newkirk, and Robert\u00a0S Koss. 2003. Agile software development: principles, patterns, and practices. Vol.\u00a02. Prentice Hall Upper Saddle River, NJ."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.61"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.61"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1044834.1044835"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.31"},{"key":"e_1_3_2_1_43_1","volume-title":"O\u2019Reilly Media","author":"Newman Sam","unstructured":"Sam Newman. 2021. Building microservices. \u201d O\u2019Reilly Media, Inc.\u201d."},{"key":"e_1_3_2_1_44_1","volume-title":"Microservices patterns: with examples in Java","author":"Richardson Chris","unstructured":"Chris Richardson. 2018. Microservices patterns: with examples in Java. Simon and Schuster."},{"key":"e_1_3_2_1_45_1","volume-title":"O\u2019Reilly Media","author":"Ruecker Bernd","unstructured":"Bernd Ruecker. 2021. Practical Process Automation. \u201d O\u2019Reilly Media, Inc.\u201d."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256942"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Claude\u00a0Elwood Shannon. 2001. A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5 1(2001) 3\u201355.","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_1_48_1","volume-title":"Two approaches to interprocedural data flow analysis","author":"Sharir Micha","unstructured":"Micha Sharir, Amir Pnueli, 1978. Two approaches to interprocedural data flow analysis. New York University. Courant Institute of Mathematical Sciences\u00a0\u2026."},{"key":"e_1_3_2_1_49_1","volume-title":"Control-flow analysis of higher-order languages or taming lambda","author":"Shivers Olin\u00a0Grigsby","unstructured":"Olin\u00a0Grigsby Shivers. 1991. Control-flow analysis of higher-order languages or taming lambda. Carnegie Mellon University."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926390"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594320"},{"key":"e_1_3_2_1_52_1","volume-title":"IEEE software 32, 1","author":"Th\u00f6nes Johannes","year":"2015","unstructured":"Johannes Th\u00f6nes. 2015. Microservices. IEEE software 32, 1 (2015), 116\u2013116."},{"key":"e_1_3_2_1_53_1","unstructured":"WASdev. 2015. sample.daytrader7. https:\/\/github.com\/WASdev\/sample.daytrader7"},{"key":"e_1_3_2_1_54_1","unstructured":"WASdev. 2019. sample.mono-to-ms.pbw-monolith. https:\/\/github.com\/WASdev\/sample.mono-to-ms.pbw-monolith"},{"key":"e_1_3_2_1_55_1","unstructured":"Zhu Xiaojin and Ghahramani Zoubin. 2002. Learning from labeled and unlabeled data with label propagation. Tech. Rep. Technical Report CMU-CALD-02\u2013107 Carnegie Mellon University (2002)."}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3556960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:55:47Z","timestamp":1755849347000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":55,"alternative-id":["10.1145\/3551349.3556960","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3556960","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}