{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:16Z","timestamp":1742914216568,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031039478"},{"type":"electronic","value":"9783031039485"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-03948-5_30","type":"book-chapter","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T14:07:17Z","timestamp":1653314837000},"page":"369-381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Software Defect Prediction Method Based on Cost-Sensitive Random Forest"],"prefix":"10.1007","author":[{"given":"Wei-Dong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Sheng-Dong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"issue":"5","key":"30_CR1","first-page":"1288","volume":"30","author":"L Cai","year":"2019","unstructured":"Cai, L., Fan, Y., Yan, M., Xia, X.: Research progress in real-time software defect prediction. J. Softw. 30(5), 1288\u20131307 (2019)","journal-title":"J. Softw."},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Nagappan, N., Ball, T.: Use of relative code churn measures to predict system defect density. In: Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), pp. 284\u2013292 (2005)","DOI":"10.1145\/1062455.1062514"},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0164-1212(90)90040-S","volume":"12","author":"BT Compton","year":"1990","unstructured":"Compton, B.T., Withrow, C.: Prediction and control of ADA software defects. J. Syst. Softw. 12, 199\u2013207 (1990)","journal-title":"J. Syst. Softw."},{"key":"30_CR4","unstructured":"Menzies, T., DiStefano, J.S., Orrego, A.S.: Assessing Predictors of Software Defects (2004)"},{"key":"30_CR5","unstructured":"Xing, F., Guo, P., Lyu, M.R.: A novel method for early software quality prediction based on support vector machine. In: 16th IEEE International Symposium on Software Reliability Engineering (ISSRE 2005), vol. 10, p. 222 (2005)"},{"issue":"14","key":"30_CR6","doi-asserted-by":"publisher","first-page":"8249","DOI":"10.1007\/s00521-020-04960-1","volume":"33","author":"K Wang","year":"2020","unstructured":"Wang, K., Liu, L., Yuan, C., Wang, Z.: Software defect prediction model based on LASSO\u2013SVM. Neural Comput. Appl. 33(14), 8249\u20138259 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"30_CR7","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1007\/s11219-018-9436-4","volume":"27","author":"H Ji","year":"2019","unstructured":"Ji, H., Huang, S., Wu, Y., Hui, Z., Zheng, C.: A new weighted naive Bayes method based on information diffusion for software defect prediction. Softw. Qual. J. 27(3), 923\u2013968 (2019)","journal-title":"Softw. Qual. J."},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.asoc.2015.04.045","volume":"33","author":"\u00d6F Arar","year":"2015","unstructured":"Arar, \u00d6.F., Ayan, K.: Software defect prediction using cost-sensitive neural network. Appl. Soft Comput. 33, 263\u2013277 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"6","key":"30_CR9","doi-asserted-by":"publisher","first-page":"4537","DOI":"10.1016\/j.eswa.2009.12.056","volume":"37","author":"J Zheng","year":"2010","unstructured":"Zheng, J.: Cost-sensitive boosting neural networks for software defect prediction. Expert Syst. Appl. 37(6), 4537\u20134543 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"30_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/24.855532","volume":"49","author":"TM Khoshgoftaar","year":"2000","unstructured":"Khoshgoftaar, T.M., Allen, E.B., Jones, W.D., Hudepohl, J.P.: Classification-tree models of software-quality over multiple releases. IEEE Trans. Reliab. 49(1), 4\u201311 (2000)","journal-title":"IEEE Trans. Reliab."},{"issue":"2","key":"30_CR11","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1007\/s11277-017-5117-z","volume":"102","author":"L Zhou","year":"2018","unstructured":"Zhou, L., Li, R., Zhang, S., Wang, H.: Imbalanced data processing model for software defect prediction. Wirel. Person. Commun. 102(2), 937\u2013950 (2018)","journal-title":"Wirel. Person. Commun."},{"issue":"6","key":"30_CR12","doi-asserted-by":"publisher","first-page":"1806","DOI":"10.1109\/TSMCC.2012.2226152","volume":"42","author":"Z Sun","year":"2012","unstructured":"Sun, Z., Song, Q., Zhu, X.: Using coding-based ensemble learning to improve software defect prediction. IEEE Trans. Syst. Man Cybern. C Appl. Rev. 42(6), 1806\u20131817 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern. C Appl. Rev."},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.is.2015.02.006","volume":"51","author":"MJ Siers","year":"2015","unstructured":"Siers, M.J., Islam, M.Z.: Software defect prediction using a cost sensitive decision forest and voting, and a potential solution to the class imbalance problem. Inf. Syst. 51, 62\u201371 (2015)","journal-title":"Inf. Syst."},{"issue":"2","key":"30_CR14","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TR.2014.2316951","volume":"63","author":"M Liu","year":"2014","unstructured":"Liu, M., Miao, L., Zhang, D.: Two-stage cost-sensitive learning for software defect prediction. IEEE Trans. Reliab. 63(2), 676\u2013686 (2014)","journal-title":"IEEE Trans. Reliab."},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Xu, L., Wang, B., Liu, L., Zhou, M., Liao, S., Yan, M.: Misclassification cost-sensitive software defect prediction. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI), pp. 256\u2013263 (2018)","DOI":"10.1109\/IRI.2018.00047"},{"issue":"1","key":"30_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"30_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-319-59288-6_59","volume-title":"Collaborate Computing: Networking, Applications and Worksharing","author":"L Zhu","year":"2017","unstructured":"Zhu, L., Yang, Y.: Improvement of decision tree ID3 algorithm. In: Wang, S., Zhou, A. (eds.) CollaborateCom 2016. LNICSSITE, vol. 201, pp. 595\u2013600. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59288-6_59"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Kraidech, S., Jearanaitanakij, K.: Improving ID3 algorithm by combining values from equally important attributes. In: 2017 21st International Computer Science and Engineering Conference (ICSEC), pp. 1\u20135 (2017)","DOI":"10.1109\/ICSEC.2017.8443862"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhou, R.: The analysis and optimization of decision tree based on ID3 algorithm. In: 2017 9th International Conference on Modelling, Identification and Control (ICMIC), pp. 924\u2013928 (2017)","DOI":"10.1109\/ICMIC.2017.8321588"},{"issue":"2","key":"30_CR20","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00058655","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123\u2013140 (1996)","journal-title":"Mach. Learn."},{"key":"30_CR21","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.isprsjprs.2016.01.011","volume":"114","author":"M Belgiu","year":"2016","unstructured":"Belgiu, M., Dr\u0103gu\u0163, L.: Random forest in remote sensing: a review of applications and future directions. ISPRS J. Photogram. Remote Sens. 114, 24\u201331 (2016)","journal-title":"ISPRS J. Photogram. Remote Sens."}],"container-title":["IFIP Advances in Information and Communication Technology","Intelligent Information Processing XI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-03948-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T08:10:53Z","timestamp":1716883853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-03948-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031039478","9783031039485"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-03948-5_30","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iip2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.intsci.ac.cn\/iip2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 reviews per paper","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}