{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:50:01Z","timestamp":1768899001177,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Natural Science Foundation of China under Grant","award":["61932021"],"award-info":[{"award-number":["61932021"]}]},{"name":"the Natural Science Foundation of Jiangsu Province under Grants","award":["BK20202001 and BK20220771"],"award-info":[{"award-number":["BK20202001 and BK20220771"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616264","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"198-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Automatically Resolving Dependency-Conflict Building Failures via Behavior-Consistent Loosening of Library Version Constraints"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6879-1628","authenticated-orcid":false,"given":"Huiyan","family":"Wang","sequence":"first","affiliation":[{"name":"Nanjing University, NANJING, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6763-1968","authenticated-orcid":false,"given":"Shuguan","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3928-9872","authenticated-orcid":false,"given":"Lingyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6299-4704","authenticated-orcid":false,"given":"Chang","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2023. Code2flow. https:\/\/code2flow.com\/"},{"key":"e_1_3_2_2_2_1","unstructured":"2023. Conda. https:\/\/docs.conda.io\/"},{"key":"e_1_3_2_2_3_1","unstructured":"2023. Dfflib. https:\/\/docs.python.org\/3\/library\/difflib.html"},{"key":"e_1_3_2_2_4_1","unstructured":"2023. Filecmp. https:\/\/docs.python.org\/3\/library\/filecmp.html"},{"key":"e_1_3_2_2_5_1","unstructured":"2023. Issue #131. https:\/\/github.com\/garyd203\/ssmash\/issues\/39"},{"key":"e_1_3_2_2_6_1","unstructured":"2023. Issue #272. https:\/\/github.com\/chaoss\/grimoirelab-manuscripts\/issues\/136"},{"key":"e_1_3_2_2_7_1","unstructured":"2023. Issue #56. https:\/\/github.com\/ivanubi\/api-indotel\/issues\/2"},{"key":"e_1_3_2_2_8_1","unstructured":"2023. Issue #99. https:\/\/github.com\/KnowledgeLinks\/rdfframework\/issues\/24"},{"key":"e_1_3_2_2_9_1","unstructured":"2023. LooCo website.. https:\/\/agnes-u.github.io\/LooCo\/"},{"key":"e_1_3_2_2_10_1","unstructured":"2023. Maven.. https:\/\/mvnrepository.com\/repos"},{"key":"e_1_3_2_2_11_1","unstructured":"2023. PEP specifications.. https:\/\/peps.python.org\/"},{"key":"e_1_3_2_2_12_1","unstructured":"2023. PIP backtracking.. https:\/\/pip.pypa.io\/en\/stable\/topics\/dependency-resolution\/"},{"key":"e_1_3_2_2_13_1","unstructured":"2023. PIP freeze.. https:\/\/pip.pypa.io\/en\/stable\/cli\/pip_freeze\/"},{"key":"e_1_3_2_2_14_1","unstructured":"2023. PIP installer.. https:\/\/pypi.org\/project\/pip\/"},{"key":"e_1_3_2_2_15_1","unstructured":"2023. PIP legacy.. https:\/\/pip.pypa.io\/en\/stable\/user_guide\/"},{"key":"e_1_3_2_2_16_1","unstructured":"2023. PyCG issues.. https:\/\/github.com\/vitsalis\/PyCG\/issues"},{"key":"e_1_3_2_2_17_1","unstructured":"2023. Python Package Index. https:\/\/pypi.org\/"},{"key":"e_1_3_2_2_18_1","unstructured":"2023. Report #2135.. https:\/\/github.com\/andylokandy\/rqalpha-mod-minute\/issues\/1"},{"key":"e_1_3_2_2_19_1","unstructured":"2023. Report #2688.. https:\/\/github.com\/gkeep\/spotify-stats\/issues\/3"},{"key":"e_1_3_2_2_20_1","unstructured":"2023. Report #282.. https:\/\/github.com\/stratosphereips\/StratosphereLinuxIPS\/issues\/163"},{"key":"e_1_3_2_2_21_1","unstructured":"2023. Report #700.. https:\/\/github.com\/yihong0618\/running_page\/issues\/282"},{"key":"e_1_3_2_2_22_1","unstructured":"2023. SemVer.. https:\/\/semver.org\/"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054837"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224274"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330249"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3191353"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Wei Cheng Xiangrong Zhu and Wei Hu. 2022. Conflict-aware Inference of Python Compatible Runtime Environments with Domain Knowledge Graph.","DOI":"10.1145\/3510003.3510078"},{"key":"e_1_3_2_2_28_1","unstructured":"Fraser D. Horner E. Jeronen J. and Massot P.. [n. d.]. Pyan3: Offline call graph generator for Python 3. https:\/\/github.com\/davidfraser\/pyan"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00061"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275535"},{"key":"e_1_3_2_2_31_1","unstructured":"Zhang G. and Wuxia J.. 2023. Depends. https:\/\/github.com\/multilang-depends\/depends"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of the 2018 IEEE International Conference on Big Data (Big Data). 4016\u20134025","author":"Gharibi G.","unstructured":"G. Gharibi, R. Alanazi, and Y. Lee. 2018. Automatic Hierarchical Clustering of Static Call Graphs for Program Comprehension. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data). 4016\u20134025."},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 2018 IEEE\/ACM International Conference on Automated Software Engineering (ASE","author":"Gharibi G.","year":"2018","unstructured":"G. Gharibi, R. Tripathi, and Y. Lee. 2018. Code2graph: Automatic Generation of Static Call Graphs for Python Source Code. In Proceedings of the 2018 IEEE\/ACM International Conference on Automated Software Engineering (ASE 2018). 880\u2013883."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183399.3183417"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553570"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00031"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00047"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00052"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3106247"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00021"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.55"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9521-5"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556896"},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE","author":"Li Y.","year":"2019","unstructured":"Y. Li. 2019. Empirical Study of Python Call Graph. In Proceedings of the 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2019). 1274\u20131276."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380442"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.49"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464797"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-2384-6"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00146"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560437"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409735"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00014"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380426"},{"key":"e_1_3_2_2_54_1","volume-title":"Proceedings of the 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE","author":"Widyasari R.","year":"2020","unstructured":"R. Widyasari, Q. S. Sheng, C. Lok, H. Qi, and E. L. Ouh. 2020. BugsInPy: A Database of Existing Bugs in Python Programs to Enable Controlled Testing and Debugging studies. In Proceedings of the 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2020). 1556\u20131560."},{"key":"e_1_3_2_2_55_1","unstructured":"Yulun Wu Zeliang Yu Ming Wen Qiang Li Deqing Zou and Hai Jin. 2023. Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem."},{"key":"e_1_3_2_2_56_1","unstructured":"Hongjie Ye Wei Chen Wensheng Dou Guoquan Wu and Jun Wei. 2022. Knowledge-Based Environment Dependency Inference for Python Programs. May 12."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054800"},{"key":"e_1_3_2_2_58_1","article-title":"TOAST:Automated Testing of Object Transformers in Dynamic Software Updates","volume":"37","author":"Zhao Ze-Lin","year":"2022","unstructured":"Ze-Lin Zhao, Di Huang, and Xiao-Xing Ma. 2022. TOAST:Automated Testing of Object Transformers in Dynamic Software Updates. Journal of Computer Science and Technology (JCST), 37, 1 (2022), 1, 50\u201366.","journal-title":"Journal of Computer Science and Technology (JCST)"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70747"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:03Z","timestamp":1750178163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":59,"alternative-id":["10.1145\/3611643.3616264","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616264","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}