{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T15:45:38Z","timestamp":1750347938857,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Royal Society of New Zealand","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,29]]},"DOI":"10.1145\/3563768.3565548","type":"proceedings-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T18:49:27Z","timestamp":1669920567000},"page":"29-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Automated Updates of Software Dependencies"],"prefix":"10.1145","author":[{"given":"Dhanushka","family":"Jayasuriya","sequence":"first","affiliation":[{"name":"University of Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"unstructured":"2018. SignatureTests. http:\/\/wiki.apidesign.org\/wiki\/SigTest","key":"e_1_3_2_1_1_1"},{"unstructured":"2022. Debian-Details of package japitools in stretch. https:\/\/packages. debian.org\/stretch\/devel\/japitools","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.asoc"},{"doi-asserted-by":"publisher","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3 2 (1 2006 ) 77-101. https:\/\/doi.org\/10.1191\/1478088706qp063oa 10.1191\/1478088706qp063oa","key":"e_1_3_2_1_4_1","DOI":"10.1191\/1478088706qp063oa"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/SANER.2018.8330249"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ICSM.1996.565039"},{"volume-title":"MOBILESoft 2015 : second ACM International Conference on Mobile Software Engineering and Systems (2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE)","author":"Cox Joel","unstructured":"Joel Cox, Eric Bouwers, Marko van Eekelen, and Joost Visser. 2015. Measuring Dependency Freshness in Software Systems. In MOBILESoft 2015 : second ACM International Conference on Mobile Software Engineering and Systems (2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE), Vol. 2 ). IEEE Press\u201e 109-118.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2000799.2000805"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/TSE"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/3133956.3134059"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/CSMR-WCRE.2014.6747226"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/MSR.2019.00061"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1002\/smr.328"},{"key":"e_1_3_2_1_14_1","volume-title":"Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). 277-292","author":"Duan Yue","year":"2019","unstructured":"Yue Duan, Lian Gao, Jie Hu, and Heng Yin. 2019. Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). 277-292."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3236024.3275535"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/3468264.3468571"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ICSE.2005.1553570"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2597073.2597074"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/s10664-019-09780-z"},{"unstructured":"Lukas Krejci. 2022. Revapi. https:\/\/revapi.org\/revapi-site\/main\/index. html","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","unstructured":"Raula Gaikovina Kula Daniel M. German Ali Ouni Takashi Ishio and Katsuro Inoue. 2018. Do Developers Update Their Library Dependencies? Empirical Software Engineering 23 1 (2 2018 ) 384-417. https:\/\/doi.org\/10.1007\/s10664-017-9521-5 10.1007\/s10664-017-9521-5","key":"e_1_3_2_1_21_1","DOI":"10.1007\/s10664-017-9521-5"},{"unstructured":"Lars K\u00fchne. 2005. Clirr. http:\/\/clirr.sourceforge.net\/","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3213846.3213857"},{"unstructured":"Maven. 2022. japicmp-base. https:\/\/siom79.github.io\/japicmp\/","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","unstructured":"Gianluca Mezzetti Anders M\u00f8ller and Martin Toldam Torp. 2018. Type Regression Testing to Detect Breaking Changes in Node.js Libraries (Artifact). Dagstuhl Artifacts Series 4 3 ( 2018 ) 8 : 1-8 :2. https:\/\/doi. org\/10.4230\/DARTS.4. 3. 8 10.4230\/DARTS.4.3.8","key":"e_1_3_2_1_25_1","DOI":"10.4230\/DARTS.4.3.8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/ASE.2017.8115621"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/3428255"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/3379597.3387476"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1869459.1869486"},{"doi-asserted-by":"crossref","unstructured":"Lina Ochoa Thomas Degueule Jean-R\u00e9my Falleri and Jurgen Vinju. 2021. Breaking Bad? Semantic Versioning and Impact of Breaking Changes in Maven Central. arXiv preprint arXiv:2110.07889 ( 2021 ).","key":"e_1_3_2_1_30_1","DOI":"10.1007\/s10664-021-10052-y"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/3239235.3268920"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/3372297.3417232"},{"unstructured":"Tom Preston-Werner. n.d. Semantic Versioning 2.0.0. https:\/\/semver. org\/","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/SCAM.2014.30"},{"key":"e_1_3_2_1_35_1","volume-title":"Beyond api signatures: An empirical study on behavioral backward incompatibilities of java software libraries. Department of Computer Science","author":"Ruiz Eric","year":"2015","unstructured":"Eric Ruiz, Shaikh Mostafa, and Xiaoyin Wang. 2015. Beyond api signatures: An empirical study on behavioral backward incompatibilities of java software libraries. Department of Computer Science, University of Texas at San Antonio, Tech. Rep ( 2015 )."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/MSR.2017.14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/3236024.3264598"},{"unstructured":"Inc Synopsys. 2021. 2021 Open Source Security and Risk Analysis Report.","key":"e_1_3_2_1_38_1"},{"unstructured":"Inc Tidelift. 2022. Libraries.io-The Open Source Discovery Service. https:\/\/libraries.io\/data","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/ICPC.2019.00052"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/SANER48275.2020.9054800"}],"event":{"sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"acronym":"SPLASH Companion '22","name":"SPLASH Companion '22: 2022 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity","location":"Auckland New Zealand"},"container-title":["Companion Proceedings of the 2022 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563768.3565548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3563768.3565548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:07Z","timestamp":1750186807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563768.3565548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":41,"alternative-id":["10.1145\/3563768.3565548","10.1145\/3563768"],"URL":"https:\/\/doi.org\/10.1145\/3563768.3565548","relation":{},"subject":[],"published":{"date-parts":[[2022,11,29]]},"assertion":[{"value":"2022-12-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}