Understanding Breaking Changes in the Wild Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1145/3597926.3598147
Modern software applications rely heavily on the usage of libraries, which provide reusable functionality, to accelerate the development process. As libraries evolve and release new versions, the software systems that depend on those libraries (the clients) should update their dependencies to use these new versions as the new release could, for example, include critical fixes for security vulnerabilities. However, updating is not always a smooth process, as it can result in software failures in the clients if the new version includes breaking changes. Yet, there is little research on how these breaking changes impact the client projects in the wild. To identify if changes between two library versions cause breaking changes at the client end, we perform an empirical study on Java projects built using Maven. For the analysis, we used 18,415 Maven artifacts, which declared 142,355 direct dependencies, of which 71.60% were not up-to-date. We updated these dependencies and found that 11.58% of the dependency updates contain breaking changes that impact the client. We further analyzed these changes in the library which impact the client projects and examine if libraries have adhered to the semantic versioning scheme when introducing breaking changes in their releases. Our results show that changes in transitive dependencies were a major factor in introducing breaking changes during dependency updates and almost half of the detected client impacting breaking changes violate the semantic versioning scheme by introducing breaking changes in non-Major updates.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3597926.3598147
- https://dl.acm.org/doi/pdf/10.1145/3597926.3598147
- OA Status
- gold
- Cited By
- 15
- References
- 38
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4384155578
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4384155578Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3597926.3598147Digital Object Identifier
- Title
-
Understanding Breaking Changes in the WildWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-07-12Full publication date if available
- Authors
-
Dhanushka Jayasuriya, Valerio Terragni, Jens Dietrich, Samuel Ou, Kelly BlincoeList of authors in order
- Landing page
-
https://doi.org/10.1145/3597926.3598147Publisher landing page
- PDF URL
-
https://dl.acm.org/doi/pdf/10.1145/3597926.3598147Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://dl.acm.org/doi/pdf/10.1145/3597926.3598147Direct OA link when available
- Concepts
-
Software versioning, Computer science, Java, Dependency (UML), Software evolution, Process (computing), Software engineering, Exploit, Transitive relation, Software, Software development, Database, Programming language, World Wide Web, Computer security, Software construction, Mathematics, CombinatoricsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
15Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 7, 2024: 7, 2023: 1Per-year citation counts (last 5 years)
- References (count)
-
38Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4384155578 |
|---|---|
| doi | https://doi.org/10.1145/3597926.3598147 |
| ids.doi | https://doi.org/10.1145/3597926.3598147 |
| ids.openalex | https://openalex.org/W4384155578 |
| fwci | 9.2773144 |
| type | article |
| title | Understanding Breaking Changes in the Wild |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 1444 |
| biblio.first_page | 1433 |
| topics[0].id | https://openalex.org/T10260 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Software Engineering Research |
| topics[1].id | https://openalex.org/T12423 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9976000189781189 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1712 |
| topics[1].subfield.display_name | Software |
| topics[1].display_name | Software Reliability and Analysis Research |
| topics[2].id | https://openalex.org/T12127 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9954000115394592 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Software System Performance and Reliability |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C198140048 |
| concepts[0].level | 3 |
| concepts[0].score | 0.7620376348495483 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q10859422 |
| concepts[0].display_name | Software versioning |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7392572164535522 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C548217200 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6069654226303101 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q251 |
| concepts[2].display_name | Java |
| concepts[3].id | https://openalex.org/C19768560 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5924172401428223 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q320727 |
| concepts[3].display_name | Dependency (UML) |
| concepts[4].id | https://openalex.org/C202105479 |
| concepts[4].level | 5 |
| concepts[4].score | 0.5096569061279297 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q265013 |
| concepts[4].display_name | Software evolution |
| concepts[5].id | https://openalex.org/C98045186 |
| concepts[5].level | 2 |
| concepts[5].score | 0.46510013937950134 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[5].display_name | Process (computing) |
| concepts[6].id | https://openalex.org/C115903868 |
| concepts[6].level | 1 |
| concepts[6].score | 0.45613816380500793 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q80993 |
| concepts[6].display_name | Software engineering |
| concepts[7].id | https://openalex.org/C165696696 |
| concepts[7].level | 2 |
| concepts[7].score | 0.44512930512428284 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11287 |
| concepts[7].display_name | Exploit |
| concepts[8].id | https://openalex.org/C191399111 |
| concepts[8].level | 2 |
| concepts[8].score | 0.43144968152046204 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q64861 |
| concepts[8].display_name | Transitive relation |
| concepts[9].id | https://openalex.org/C2777904410 |
| concepts[9].level | 2 |
| concepts[9].score | 0.43125784397125244 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[9].display_name | Software |
| concepts[10].id | https://openalex.org/C529173508 |
| concepts[10].level | 3 |
| concepts[10].score | 0.4028286337852478 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q638608 |
| concepts[10].display_name | Software development |
| concepts[11].id | https://openalex.org/C77088390 |
| concepts[11].level | 1 |
| concepts[11].score | 0.35185590386390686 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[11].display_name | Database |
| concepts[12].id | https://openalex.org/C199360897 |
| concepts[12].level | 1 |
| concepts[12].score | 0.33500128984451294 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[12].display_name | Programming language |
| concepts[13].id | https://openalex.org/C136764020 |
| concepts[13].level | 1 |
| concepts[13].score | 0.3301003575325012 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[13].display_name | World Wide Web |
| concepts[14].id | https://openalex.org/C38652104 |
| concepts[14].level | 1 |
| concepts[14].score | 0.2520565092563629 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[14].display_name | Computer security |
| concepts[15].id | https://openalex.org/C186846655 |
| concepts[15].level | 4 |
| concepts[15].score | 0.12870725989341736 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q3398377 |
| concepts[15].display_name | Software construction |
| concepts[16].id | https://openalex.org/C33923547 |
| concepts[16].level | 0 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[16].display_name | Mathematics |
| concepts[17].id | https://openalex.org/C114614502 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q76592 |
| concepts[17].display_name | Combinatorics |
| keywords[0].id | https://openalex.org/keywords/software-versioning |
| keywords[0].score | 0.7620376348495483 |
| keywords[0].display_name | Software versioning |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7392572164535522 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/java |
| keywords[2].score | 0.6069654226303101 |
| keywords[2].display_name | Java |
| keywords[3].id | https://openalex.org/keywords/dependency |
| keywords[3].score | 0.5924172401428223 |
| keywords[3].display_name | Dependency (UML) |
| keywords[4].id | https://openalex.org/keywords/software-evolution |
| keywords[4].score | 0.5096569061279297 |
| keywords[4].display_name | Software evolution |
| keywords[5].id | https://openalex.org/keywords/process |
| keywords[5].score | 0.46510013937950134 |
| keywords[5].display_name | Process (computing) |
| keywords[6].id | https://openalex.org/keywords/software-engineering |
| keywords[6].score | 0.45613816380500793 |
| keywords[6].display_name | Software engineering |
| keywords[7].id | https://openalex.org/keywords/exploit |
| keywords[7].score | 0.44512930512428284 |
| keywords[7].display_name | Exploit |
| keywords[8].id | https://openalex.org/keywords/transitive-relation |
| keywords[8].score | 0.43144968152046204 |
| keywords[8].display_name | Transitive relation |
| keywords[9].id | https://openalex.org/keywords/software |
| keywords[9].score | 0.43125784397125244 |
| keywords[9].display_name | Software |
| keywords[10].id | https://openalex.org/keywords/software-development |
| keywords[10].score | 0.4028286337852478 |
| keywords[10].display_name | Software development |
| keywords[11].id | https://openalex.org/keywords/database |
| keywords[11].score | 0.35185590386390686 |
| keywords[11].display_name | Database |
| keywords[12].id | https://openalex.org/keywords/programming-language |
| keywords[12].score | 0.33500128984451294 |
| keywords[12].display_name | Programming language |
| keywords[13].id | https://openalex.org/keywords/world-wide-web |
| keywords[13].score | 0.3301003575325012 |
| keywords[13].display_name | World Wide Web |
| keywords[14].id | https://openalex.org/keywords/computer-security |
| keywords[14].score | 0.2520565092563629 |
| keywords[14].display_name | Computer security |
| keywords[15].id | https://openalex.org/keywords/software-construction |
| keywords[15].score | 0.12870725989341736 |
| keywords[15].display_name | Software construction |
| language | en |
| locations[0].id | doi:10.1145/3597926.3598147 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://dl.acm.org/doi/pdf/10.1145/3597926.3598147 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis |
| locations[0].landing_page_url | https://doi.org/10.1145/3597926.3598147 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5043383315 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-6172-0472 |
| authorships[0].author.display_name | Dhanushka Jayasuriya |
| authorships[0].countries | NZ |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I154130895 |
| authorships[0].affiliations[0].raw_affiliation_string | University of Auckland, New Zealand |
| authorships[0].institutions[0].id | https://openalex.org/I154130895 |
| authorships[0].institutions[0].ror | https://ror.org/03b94tp07 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I154130895 |
| authorships[0].institutions[0].country_code | NZ |
| authorships[0].institutions[0].display_name | University of Auckland |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Dhanushka Jayasuriya |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | University of Auckland, New Zealand |
| authorships[1].author.id | https://openalex.org/A5068101658 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-5885-9297 |
| authorships[1].author.display_name | Valerio Terragni |
| authorships[1].countries | NZ |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I154130895 |
| authorships[1].affiliations[0].raw_affiliation_string | University of Auckland, New Zealand |
| authorships[1].institutions[0].id | https://openalex.org/I154130895 |
| authorships[1].institutions[0].ror | https://ror.org/03b94tp07 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I154130895 |
| authorships[1].institutions[0].country_code | NZ |
| authorships[1].institutions[0].display_name | University of Auckland |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Valerio Terragni |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | University of Auckland, New Zealand |
| authorships[2].author.id | https://openalex.org/A5075091948 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9019-6550 |
| authorships[2].author.display_name | Jens Dietrich |
| authorships[2].countries | NZ |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I41156924 |
| authorships[2].affiliations[0].raw_affiliation_string | Victoria University of Wellington, New Zealand |
| authorships[2].institutions[0].id | https://openalex.org/I41156924 |
| authorships[2].institutions[0].ror | https://ror.org/0040r6f76 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I41156924 |
| authorships[2].institutions[0].country_code | NZ |
| authorships[2].institutions[0].display_name | Victoria University of Wellington |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Jens Dietrich |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Victoria University of Wellington, New Zealand |
| authorships[3].author.id | https://openalex.org/A5065678893 |
| authorships[3].author.orcid | https://orcid.org/0009-0005-1275-5632 |
| authorships[3].author.display_name | Samuel Ou |
| authorships[3].countries | NZ |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I154130895 |
| authorships[3].affiliations[0].raw_affiliation_string | University of Auckland, New Zealand |
| authorships[3].institutions[0].id | https://openalex.org/I154130895 |
| authorships[3].institutions[0].ror | https://ror.org/03b94tp07 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I154130895 |
| authorships[3].institutions[0].country_code | NZ |
| authorships[3].institutions[0].display_name | University of Auckland |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Samuel Ou |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | University of Auckland, New Zealand |
| authorships[4].author.id | https://openalex.org/A5039326697 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-4092-9706 |
| authorships[4].author.display_name | Kelly Blincoe |
| authorships[4].countries | NZ |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I154130895 |
| authorships[4].affiliations[0].raw_affiliation_string | University of Auckland, New Zealand |
| authorships[4].institutions[0].id | https://openalex.org/I154130895 |
| authorships[4].institutions[0].ror | https://ror.org/03b94tp07 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I154130895 |
| authorships[4].institutions[0].country_code | NZ |
| authorships[4].institutions[0].display_name | University of Auckland |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Kelly Blincoe |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | University of Auckland, New Zealand |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://dl.acm.org/doi/pdf/10.1145/3597926.3598147 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Understanding Breaking Changes in the Wild |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10260 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Software Engineering Research |
| related_works | https://openalex.org/W3196043647, https://openalex.org/W3172515123, https://openalex.org/W4287163809, https://openalex.org/W2125111617, https://openalex.org/W2140073415, https://openalex.org/W174453940, https://openalex.org/W2967084907, https://openalex.org/W139178611, https://openalex.org/W4380675214, https://openalex.org/W2121459566 |
| cited_by_count | 15 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 7 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 7 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3597926.3598147 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3597926.3598147 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3597926.3598147 |
| primary_location.id | doi:10.1145/3597926.3598147 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3597926.3598147 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis |
| primary_location.landing_page_url | https://doi.org/10.1145/3597926.3598147 |
| publication_date | 2023-07-12 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W3162867182, https://openalex.org/W2078410218, https://openalex.org/W2008626182, https://openalex.org/W2990868959, https://openalex.org/W2796104318, https://openalex.org/W2783404025, https://openalex.org/W4256420017, https://openalex.org/W1969939902, https://openalex.org/W2945486631, https://openalex.org/W2084240154, https://openalex.org/W2953482240, https://openalex.org/W2081757705, https://openalex.org/W2964232059, https://openalex.org/W1506734376, https://openalex.org/W2898651898, https://openalex.org/W3213505662, https://openalex.org/W3195348753, https://openalex.org/W4393778763, https://openalex.org/W2037797835, https://openalex.org/W2733373979, https://openalex.org/W2998287930, https://openalex.org/W3121596715, https://openalex.org/W3109947658, https://openalex.org/W2967160941, https://openalex.org/W3089614391, https://openalex.org/W4225915603, https://openalex.org/W3205678849, https://openalex.org/W3001362559, https://openalex.org/W2889097348, https://openalex.org/W2163048279, https://openalex.org/W2337042987, https://openalex.org/W2784876765, https://openalex.org/W2883146311, https://openalex.org/W2605547445, https://openalex.org/W3094949573, https://openalex.org/W2600915151, https://openalex.org/W4313563521, https://openalex.org/W3099458900 |
| referenced_works_count | 38 |
| abstract_inverted_index.a | 63, 204 |
| abstract_inverted_index.As | 19 |
| abstract_inverted_index.To | 100 |
| abstract_inverted_index.We | 145, 164 |
| abstract_inverted_index.an | 117 |
| abstract_inverted_index.as | 45, 66 |
| abstract_inverted_index.at | 111 |
| abstract_inverted_index.by | 229 |
| abstract_inverted_index.if | 76, 102, 179 |
| abstract_inverted_index.in | 70, 73, 97, 169, 192, 200, 207, 233 |
| abstract_inverted_index.is | 60, 85 |
| abstract_inverted_index.it | 67 |
| abstract_inverted_index.of | 8, 139, 153, 217 |
| abstract_inverted_index.on | 5, 31, 88, 120 |
| abstract_inverted_index.to | 14, 40, 183 |
| abstract_inverted_index.we | 115, 129 |
| abstract_inverted_index.For | 126 |
| abstract_inverted_index.Our | 195 |
| abstract_inverted_index.and | 22, 149, 177, 214 |
| abstract_inverted_index.can | 68 |
| abstract_inverted_index.for | 50, 55 |
| abstract_inverted_index.how | 89 |
| abstract_inverted_index.new | 24, 43, 47, 78 |
| abstract_inverted_index.not | 61, 143 |
| abstract_inverted_index.the | 6, 16, 26, 46, 74, 77, 94, 98, 112, 127, 154, 162, 170, 174, 184, 218, 225 |
| abstract_inverted_index.two | 105 |
| abstract_inverted_index.use | 41 |
| abstract_inverted_index.(the | 34 |
| abstract_inverted_index.Java | 121 |
| abstract_inverted_index.Yet, | 83 |
| abstract_inverted_index.end, | 114 |
| abstract_inverted_index.half | 216 |
| abstract_inverted_index.have | 181 |
| abstract_inverted_index.rely | 3 |
| abstract_inverted_index.show | 197 |
| abstract_inverted_index.that | 29, 151, 160, 198 |
| abstract_inverted_index.used | 130 |
| abstract_inverted_index.were | 142, 203 |
| abstract_inverted_index.when | 188 |
| abstract_inverted_index.Maven | 132 |
| abstract_inverted_index.built | 123 |
| abstract_inverted_index.cause | 108 |
| abstract_inverted_index.fixes | 54 |
| abstract_inverted_index.found | 150 |
| abstract_inverted_index.major | 205 |
| abstract_inverted_index.study | 119 |
| abstract_inverted_index.their | 38, 193 |
| abstract_inverted_index.there | 84 |
| abstract_inverted_index.these | 42, 90, 147, 167 |
| abstract_inverted_index.those | 32 |
| abstract_inverted_index.usage | 7 |
| abstract_inverted_index.using | 124 |
| abstract_inverted_index.which | 10, 134, 140, 172 |
| abstract_inverted_index.wild. | 99 |
| abstract_inverted_index.11.58% | 152 |
| abstract_inverted_index.18,415 | 131 |
| abstract_inverted_index.71.60% | 141 |
| abstract_inverted_index.Maven. | 125 |
| abstract_inverted_index.Modern | 0 |
| abstract_inverted_index.almost | 215 |
| abstract_inverted_index.always | 62 |
| abstract_inverted_index.client | 95, 113, 175, 220 |
| abstract_inverted_index.could, | 49 |
| abstract_inverted_index.depend | 30 |
| abstract_inverted_index.direct | 137 |
| abstract_inverted_index.during | 211 |
| abstract_inverted_index.evolve | 21 |
| abstract_inverted_index.factor | 206 |
| abstract_inverted_index.impact | 93, 161, 173 |
| abstract_inverted_index.little | 86 |
| abstract_inverted_index.result | 69 |
| abstract_inverted_index.scheme | 187, 228 |
| abstract_inverted_index.should | 36 |
| abstract_inverted_index.smooth | 64 |
| abstract_inverted_index.update | 37 |
| abstract_inverted_index.142,355 | 136 |
| abstract_inverted_index.adhered | 182 |
| abstract_inverted_index.between | 104 |
| abstract_inverted_index.changes | 92, 103, 110, 159, 168, 191, 199, 210, 223, 232 |
| abstract_inverted_index.client. | 163 |
| abstract_inverted_index.clients | 75 |
| abstract_inverted_index.contain | 157 |
| abstract_inverted_index.examine | 178 |
| abstract_inverted_index.further | 165 |
| abstract_inverted_index.heavily | 4 |
| abstract_inverted_index.include | 52 |
| abstract_inverted_index.library | 106, 171 |
| abstract_inverted_index.perform | 116 |
| abstract_inverted_index.provide | 11 |
| abstract_inverted_index.release | 23, 48 |
| abstract_inverted_index.results | 196 |
| abstract_inverted_index.systems | 28 |
| abstract_inverted_index.updated | 146 |
| abstract_inverted_index.updates | 156, 213 |
| abstract_inverted_index.version | 79 |
| abstract_inverted_index.violate | 224 |
| abstract_inverted_index.However, | 58 |
| abstract_inverted_index.analyzed | 166 |
| abstract_inverted_index.breaking | 81, 91, 109, 158, 190, 209, 222, 231 |
| abstract_inverted_index.changes. | 82 |
| abstract_inverted_index.clients) | 35 |
| abstract_inverted_index.critical | 53 |
| abstract_inverted_index.declared | 135 |
| abstract_inverted_index.detected | 219 |
| abstract_inverted_index.example, | 51 |
| abstract_inverted_index.failures | 72 |
| abstract_inverted_index.identify | 101 |
| abstract_inverted_index.includes | 80 |
| abstract_inverted_index.process, | 65 |
| abstract_inverted_index.process. | 18 |
| abstract_inverted_index.projects | 96, 122, 176 |
| abstract_inverted_index.research | 87 |
| abstract_inverted_index.reusable | 12 |
| abstract_inverted_index.security | 56 |
| abstract_inverted_index.semantic | 185, 226 |
| abstract_inverted_index.software | 1, 27, 71 |
| abstract_inverted_index.updates. | 235 |
| abstract_inverted_index.updating | 59 |
| abstract_inverted_index.versions | 44, 107 |
| abstract_inverted_index.analysis, | 128 |
| abstract_inverted_index.empirical | 118 |
| abstract_inverted_index.impacting | 221 |
| abstract_inverted_index.libraries | 20, 33, 180 |
| abstract_inverted_index.non-Major | 234 |
| abstract_inverted_index.releases. | 194 |
| abstract_inverted_index.versions, | 25 |
| abstract_inverted_index.accelerate | 15 |
| abstract_inverted_index.artifacts, | 133 |
| abstract_inverted_index.dependency | 155, 212 |
| abstract_inverted_index.libraries, | 9 |
| abstract_inverted_index.transitive | 201 |
| abstract_inverted_index.versioning | 186, 227 |
| abstract_inverted_index.development | 17 |
| abstract_inverted_index.introducing | 189, 208, 230 |
| abstract_inverted_index.up-to-date. | 144 |
| abstract_inverted_index.applications | 2 |
| abstract_inverted_index.dependencies | 39, 148, 202 |
| abstract_inverted_index.dependencies, | 138 |
| abstract_inverted_index.functionality, | 13 |
| abstract_inverted_index.vulnerabilities. | 57 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/17 |
| sustainable_development_goals[0].score | 0.4099999964237213 |
| sustainable_development_goals[0].display_name | Partnerships for the goals |
| citation_normalized_percentile.value | 0.97353698 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |