{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:28:11Z","timestamp":1763458091119},"reference-count":27,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1587\/transinf.2021mpp0003","type":"journal-article","created":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T22:25:47Z","timestamp":1640989547000},"page":"11-18","source":"Crossref","is-referenced-by-count":3,"title":["An Exploration of npm Package Co-Usage Examples from Stack Overflow: A Case Study"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Syful","family":"ISLAM","sequence":"first","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dong","family":"WANG","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Raula","family":"GAIKOVINA KULA","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takashi","family":"ISHIO","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kenichi","family":"MATSUMOTO","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] J. Dietrich, K. Jezek, and P. Brada, \u201cBroken promises: An empirical study into evolution problems in java programs caused by library upgrades,\u201d 2014 Software Evolution Week-IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), pp.64-73, IEEE, 2014. 10.1109\/csmr-wcre.2014.6747226","DOI":"10.1109\/CSMR-WCRE.2014.6747226"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] S. Raemaekers, A. van Deursen, and J. Visser, \u201cSemantic versioning and impact of breaking changes in the maven repository,\u201d J. Syst. Softw., vol.129, pp.140-158, 2017. 10.1016\/j.jss.2016.04.008","DOI":"10.1016\/j.jss.2016.04.008"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S. Raemaekers, A. van Deursen, and J. Visser, \u201cSemantic versioning versus breaking changes: A study of the maven repository,\u201d 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation, pp.215-224, 2014. 10.1109\/scam.2014.30","DOI":"10.1109\/SCAM.2014.30"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] F.L. De La Mora and S. Nadi, \u201cWhich library should i use?: A metric-based comparison of software libraries,\u201d Proc. 40th International Conference on Software Engineering: New Ideas and Emerging Results, pp.37-40, 2018. 10.1145\/3183399.3183418","DOI":"10.1145\/3183399.3183418"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] J. Dietrich, D. Pearce, J. Stringer, A. Tahir, and K. Blincoe, \u201cDependency versioning in the wild,\u201d 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), pp.349-359, 2019. 10.1109\/msr.2019.00061","DOI":"10.1109\/MSR.2019.00061"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] F. Thung, D. Lo, and J. Lawall, \u201cAutomated library recommendation,\u201d 2013 20th Working conference on reverse engineering (WCRE), pp.182-191, 2013. 10.1109\/wcre.2013.6671293","DOI":"10.1109\/WCRE.2013.6671293"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] A. Ouni, R.G. Kula, M. Kessentini, T. Ishio, D.M. German, and K. Inoue, \u201cSearch-based software library recommendation using multi-objective optimization,\u201d Inform. Softw. Tech., vol.83, pp.55-75, 2017. 10.1016\/j.infsof.2016.11.007","DOI":"10.1016\/j.infsof.2016.11.007"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] M.A. Saied, A. Ouni, H. Sahraoui, R.G. Kula, K. Inoue, and D. Lo, \u201cImproving reusability of software libraries through usage pattern mining,\u201d J. Syst. Softw., vol.145, pp.164-179, 2018. 10.1016\/j.jss.2018.08.032","DOI":"10.1016\/j.jss.2018.08.032"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] H. Alrubaye, M.W. Mkaouer, I. Khokhlov, L. Reznik, A. Ouni, and J. Mcgoff, \u201cLearning to recommend third-party library migration opportunities at the API level,\u201d Applied Soft Computing, vol.90, p.106140, 2020. 10.1016\/j.asoc.2020.106140","DOI":"10.1016\/j.asoc.2020.106140"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] H. Yu, X. Xia, X. Zhao, and W. Qiu, \u201cCombining collaborative filtering and topic modeling for more accurate android mobile app library recommendation,\u201d Proc. 9th Asia-Pacific Symposium on Internetware, pp.1-6, 2017. 10.1145\/3131704.3131721","DOI":"10.1145\/3131704.3131721"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] P.T. Nguyen, J. Di Rocco, D. Di Ruscio, and M. Di Penta, \u201cCrossRec: Supporting software developers by recommending third-party libraries,\u201d J. Syst. Softw., vol.161, p.110460, 2020. 10.1016\/j.jss.2019.110460","DOI":"10.1016\/j.jss.2019.110460"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] Y. Wu, S. Wang, C.-P. Bezemer, and K. Inoue, \u201cHow do developers utilize source code from stack overflow?,\u201d Empir. Softw. Eng., vol.24, no.2, pp.637-673, 2019. 10.1007\/s10664-018-9634-5","DOI":"10.1007\/s10664-018-9634-5"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] C. Chen and Z. Xing, \u201cSimilartech: automatically recommend analogical libraries across different programming languages,\u201d Proc. 31st IEEE\/ACM International Conference on Automated Software Engineering, pp.834-839, 2016. 10.1145\/2970276.2970290","DOI":"10.1145\/2970276.2970290"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] S. Mahajan, N. Abolhassani, and M.R. Prasad, \u201cRecommending stack overflow posts for fixing runtime exceptions using failure scenario matching,\u201d Proc. 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp.1052-1064, 2020. 10.1145\/3368089.3409764","DOI":"10.1145\/3368089.3409764"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] C. Treude and M.P. Robillard, \u201cAugmenting API documentation with insights from stack overflow,\u201d Proc. 38th International Conference on Software Engineering, pp.392-403, 2016. 10.1145\/2884781.2884800","DOI":"10.1145\/2884781.2884800"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] G. Uddin, F. Khomh, and C.K. Roy, \u201cMining API usage scenarios from stack overflow,\u201d Inform. Softw. Tech., vol.122, p.106277, 2020. 10.1016\/j.infsof.2020.106277","DOI":"10.1016\/j.infsof.2020.106277"},{"key":"17","unstructured":"[17] E.L. Vargas, M. Aniche, C. Treude, M. Bruntink, and G. Gousios, \u201cSelecting third-party libraries: The practitioners&apos; perspective,\u201d Proc. 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp.245-256, 2020. 10.1145\/3368089.3409711"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] L. Xavier, A. Hora, and M.T. Valente, \u201cWhy do we break APIs? First answers from developers,\u201d 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp.392-396, 2017. 10.1109\/saner.2017.7884640","DOI":"10.1109\/SANER.2017.7884640"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] B. Todorov, R.G. Kula, T. Ishio, and K. Inoue, \u201cSoL Mantra: Visualizing update opportunities based on library coexistence,\u201d 2017 IEEE Working Conference on Software Visualization (VISSOFT), pp.129-133, 2017. 10.1109\/vissoft.2017.23","DOI":"10.1109\/VISSOFT.2017.23"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] R. Rubei, C.D. Sipio, P.T. Nguyen, J.D. Rocco, and D.D. Ruscio, \u201cPostFinder: Mining stack overflow posts to support software developers,\u201d Inform. Softw. Tech., vol.127, p.106367, 2020. 10.1016\/j.infsof.2020.106367","DOI":"10.1016\/j.infsof.2020.106367"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] S. Baltes, L. Dumani, C. Treude, and S. Diehl, \u201cSOTorrent: reconstructing and analyzing the evolution of stack overflow posts,\u201d Proc. 15th International Conference on Mining Software Repositories, pp.319-330, 2018. 10.1145\/3196398.3196430","DOI":"10.1145\/3196398.3196430"},{"key":"22","unstructured":"[22] A.J. Viera, J.M. Garrett, et al., \u201cUnderstanding interobserver agreement: The kappa statistic,\u201d Fam med, vol.37, no.5, pp.360-363, 2005."},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] A. Decan, T. Mens, and P. Grosjean, \u201cAn empirical comparison of dependency network evolution in seven software packaging ecosystems,\u201d Empir. Softw. Eng., vol.24, no.1, pp.381-416, 2019. 10.1007\/s10664-017-9589-y","DOI":"10.1007\/s10664-017-9589-y"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] C. Bogart, C. K\u00e4stner, J. Herbsleb, and F. Thung, \u201cHow to break an API: cost negotiation and community values in three software ecosystems,\u201d Proc. 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp.109-120, 2016. 10.1145\/2950290.2950325","DOI":"10.1145\/2950290.2950325"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] G. Bavota, G. Canfora, M.D. Penta, R. Oliveto, and S. Panichella, \u201cHow the Apache community upgrades dependencies: an evolutionary study,\u201d Empir. Softw. Eng., vol.20, no.5, pp.1275-1317, 2015. 10.1007\/s10664-014-9325-9","DOI":"10.1007\/s10664-014-9325-9"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] L. Xavier, A. Brito, A. Hora, and M.T. Valente, \u201cHistorical and impact analysis of API breaking changes: A large-scale study,\u201d 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp.138-147, IEEE, 2017. 10.1109\/saner.2017.7884616","DOI":"10.1109\/SANER.2017.7884616"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] R.G. Kula, D.M. German, A. Ouni, T. Ishio, and K. Inoue, \u201cDo developers update their library dependencies?,\u201d Empir. Softw. Eng., vol.23, no.1, pp.384-417, 2018. 10.1007\/s10664-017-9521-5","DOI":"10.1007\/s10664-017-9521-5"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/1\/E105.D_2021MPP0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T04:26:49Z","timestamp":1641011209000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/1\/E105.D_2021MPP0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021mpp0003","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]},"article-number":"2021MPP0003"}}