{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T02:16:06Z","timestamp":1777515366324,"version":"3.51.4"},"publisher-location":"Cham","reference-count":85,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031079689","type":"print"},{"value":"9783031079696","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07969-6_24","type":"book-chapter","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T22:02:29Z","timestamp":1656799349000},"page":"317-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Systematic Literature Review of Machine Learning Applications in Software Engineering"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5973-7731","authenticated-orcid":false,"given":"Houda","family":"Mezouar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1921-4431","authenticated-orcid":false,"given":"Abdellatif El","family":"Afia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,3]]},"reference":[{"key":"24_CR1","unstructured":"Rothman, D.: Artificial Intelligence by Example, 1st edn. Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK (2018)"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.msksp.2018.11.012","volume":"39","author":"C Tack","year":"2019","unstructured":"Tack, C.: Artificial intelligence and machine learning | applications in musculoskeletal physiotherapy. Musculoskeletal Sci. Pract. 39, 164\u2013169 (2019)","journal-title":"Musculoskeletal Sci. Pract."},{"key":"24_CR3","volume-title":"Introduction to Machine Learning","author":"E Alpayd\u0131n","year":"2010","unstructured":"Alpayd\u0131n, E.: Introduction to Machine Learning, 2nd edn. The MIT Press Cambridge, Massachusetts (2010)","edition":"2"},{"key":"24_CR4","unstructured":"Partridge, D.: Artificial Intelligence and Software Engineering Understanding the Promise of the Future. AMACOM American Management Association, 1601 Broadway New York, New York 10019, USA (1998)"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.jss.2018.10.029","volume":"147","author":"K Dimitra","year":"2019","unstructured":"Dimitra, K., Yihao, L., Elvira, M.A., Misirlis, N., Wong, W.E.: A bibliometric assessment of software engineering scholars and institutions (2010\u20132017). J. Syst. Softw. 147, 246\u2013261 (2019)","journal-title":"J. Syst. Softw."},{"key":"24_CR6","volume-title":"Machine Learning Applications in Software Engineering (Series on Software Engineering and Knowledge Engineering)","author":"D Zhang","year":"2005","unstructured":"Zhang, D., Tsai, J.P.: Machine Learning Applications in Software Engineering (Series on Software Engineering and Knowledge Engineering). World Scientific Publishing Company, Singapore (2005)"},{"key":"24_CR7","volume-title":"Doing Your Literature Review: Traditional and Systematic Techniques","author":"J Jesson","year":"2011","unstructured":"Jesson, J., Matheson, L., Lacey, F.M.: Doing Your Literature Review: Traditional and Systematic Techniques, 1st edn. SAGE Publications Ltd, Newbury Park (2011)","edition":"1"},{"key":"24_CR8","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01, School of Computer Science and Mathematics, Keele University (2007)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Hamou-Lhadj, W., Nayrolles, M.: A project on software defect prevention at commit-time: a success story of university-industry research collaboration. In: The 5th International Workshop on Software Engineering Research and Industrial Practice on Proceedings, Gothenburg, Sweden, pp. 24\u201325 (2018)","DOI":"10.1145\/3195546.3206423"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Sai, Z., Congle, Z.: Software bug localization with Markov logic. In: The 36th International Conference on Software Engineering, Hyderabad, India, pp. 424\u2013427 (2014)","DOI":"10.1145\/2591062.2591099"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Sunghun, K., Whitehead, E.J., Yi, Z.: Classifying software changes: clean or buggy? IEEE Trans. Softw. Eng. 34(2), 181\u2013196 (2008)","DOI":"10.1109\/TSE.2007.70773"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Ruchika, M., Laavanye, B., Sushant, S., Pragati, P.: Empirical comparison of machine learning algorithms for bug prediction in open source software. In: The International Conference on Big Data Analytics and Computational Intelligence (ICBDAC), Chirala, India, pp. 40\u201345 (2017)","DOI":"10.1109\/ICBDACI.2017.8070806"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Meiliana, Syaeful, K., Harco, L.H.S.W., Ford, L.G., Edi, A.: Software metrics for fault prediction using machine learning approaches: a literature review with PROMISE repository dataset. In: The International Conference on Cybernetics and Computational Intelligence (CyberneticsCom), Phuket, Thailand, pp. 19\u201323 (2017)","DOI":"10.1109\/CYBERNETICSCOM.2017.8311708"},{"key":"24_CR14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.jss.2007.05.035","volume":"81","author":"G Iker","year":"2008","unstructured":"Iker, G.: Applying machine learning to software fault-proneness prediction. J. Syst. Softw. 81, 186\u2013195 (2008)","journal-title":"J. Syst. Softw."},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.asoc.2014.11.023","volume":"27","author":"M Ruchika","year":"2015","unstructured":"Ruchika, M.: A systematic review of machine learning techniques for software fault prediction. Appl. Soft Comput. 27, 504\u2013518 (2015)","journal-title":"Appl. Soft Comput."},{"key":"24_CR16","unstructured":"Jyoti, D.: A review of improving software quality using machine learning algorithms, Int. J. Comput. Sci. Mob. Comput. 6(3), 148\u2013153 (2017)"},{"key":"24_CR17","unstructured":"Hanchate, D.B., Bichkar, R.S.: The machine learning in software project management: a journey. Part II. Appl. Discrete Math. Heuristic Alg. 1(4), 29\u201358 (2015)"},{"key":"24_CR18","first-page":"1","volume":"1","author":"AK Pandey","year":"2018","unstructured":"Pandey, A.K., Gupta, M.: Software fault classification using extreme learning machine: a cognitive approach. Evol. Intel. 1, 1\u20138 (2018)","journal-title":"Evol. Intel."},{"issue":"2","key":"24_CR19","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s13198-016-0479-2","volume":"8","author":"A Kaur","year":"2017","unstructured":"Kaur, A., Kaur, K., Chopra, D.: An empirical study of software entropy based bug prediction using machine learning. Int. J. Syst. Assur. Eng. Manage 8(2), 599\u2013616 (2017)","journal-title":"Int. J. Syst. Assur. Eng. Manage"},{"issue":"7","key":"24_CR20","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1631\/FITEE.1601501","volume":"19","author":"L Kumar","year":"2018","unstructured":"Kumar, L., Tirkey, A., Rath, S.-K.: An effective fault prediction model developed using an extreme learning machine with various kernel methods. Front. Inform. Technol. Electron. Eng. 19(7), 864\u2013888 (2018)","journal-title":"Front. Inform. Technol. Electron. Eng."},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Nitish, P., Debarshi, K., Hudait, A., Amitava, S.: Automated classification of software issue reports using machine learning techniques: an empirical study. Innov. Syst. Softw. Eng. 13(4), 279\u2013297 (2017)","DOI":"10.1007\/s11334-017-0294-1"},{"issue":"2","key":"24_CR22","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10515-011-0092-1","volume":"19","author":"M Li","year":"2012","unstructured":"Li, M., Zhang, H., Rongxin, W., Zhou, Z.-H.: Sample-based software defect prediction with active and semi-supervised learning. Autom. Softw. Eng. 19(2), 201\u2013230 (2012)","journal-title":"Autom. Softw. Eng."},{"key":"24_CR23","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.infsof.2018.10.004","volume":"106","author":"X Zhou","year":"2019","unstructured":"Zhou, X., et al.: Software defect prediction based on kernel PCA and weighted extreme learning machine. Inf. Softw. Technol. 106, 182\u2013200 (2019)","journal-title":"Inf. Softw. Technol."},{"key":"24_CR24","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1016\/j.asoc.2016.04.032","volume":"49","author":"R Malhotra","year":"2016","unstructured":"Malhotra, R.: An empirical framework for defect prediction using machine learning techniques with Android software. Appl. Soft Comput. 49, 1034\u20131050 (2016)","journal-title":"Appl. Soft Comput."},{"key":"24_CR25","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.ins.2018.10.056","volume":"477","author":"W Hua","year":"2019","unstructured":"Hua, W., et al.: Establishing a software defect prediction model via effective reduction. Inf. Sci. 477, 399\u2013409 (2019)","journal-title":"Inf. Sci."},{"key":"24_CR26","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.infsof.2014.07.005","volume":"58","author":"IH Laradji","year":"2015","unstructured":"Laradji, I.H., et al.: Software defect prediction using ensemble learning on selected features. Inf. Softw. Technol. 58, 388\u2013402 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"24_CR27","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.asoc.2016.06.023","volume":"49","author":"PPM Diego","year":"2016","unstructured":"Diego, P.P.M., et al.: Classification with reject option for software defect prediction. Appl. Soft Comput. 49, 1085\u20131093 (2016)","journal-title":"Appl. Soft Comput."},{"key":"24_CR28","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.eswa.2018.12.033","volume":"122","author":"H Turabiedh","year":"2019","unstructured":"Turabiedh, H., Mafarja, M., Li, X.: Iterated feature selection algorithms with layered recurrent neural network for software fault prediction. Expert Syst. Appl. 122, 27\u201342 (2019)","journal-title":"Expert Syst. Appl."},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Minku, L.L., Yao, X.: A principled evaluation of ensembles of learning machines for software effort estimation. In: The 7th International Conference on Predictive Models in Software Engineering, Banff, Alberta, Canada (2011)","DOI":"10.1145\/2020390.2020399"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Murwantara, I.M., Bordbar, B., Minku, L.L.: Measuring energy consumption for web service product configuration. In: The 16th International Conference on Information Integration and Web-based Applications & Services, Hanoi, Viet Nam, pp. 224\u2013228 (2014)","DOI":"10.1145\/2684200.2684314"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Patel, K., Fogarty, J., Landay, J.A., Harrison, B.: Investigating statistical machine learning as a tool for software development. In: The SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy, pp. 667\u2013676 (2008)","DOI":"10.1145\/1357054.1357160"},{"key":"24_CR32","doi-asserted-by":"crossref","unstructured":"Rashid, E., Patnayak, S., Bhattacherjee, V.: A survey in the area of machine learning and its application for software quality prediction. ACM SIGSOFT Softw. Eng. Notes 37(5), 1\u20137 (2012)","DOI":"10.1145\/2347696.2347709"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Twala, B., Cartwright, M., Shepperd, M.: Ensemble of missing data techniques to improve software prediction accuracy. In: The 28th International Conference on Software Engineering, Shanghai, China, pp. 909\u2013912 (2006)","DOI":"10.1145\/1134285.1134449"},{"key":"24_CR34","unstructured":"Cesar, J.C., Fehmi, J., Yasir, M.: Is predicting software security bugs using deep learning better than the traditional machine learning algorithms? In: The International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, pp. 95\u2013102 (2018)"},{"key":"24_CR35","doi-asserted-by":"crossref","unstructured":"Feng, Y., Chen, Z.: Multi-label software behavior learning. In: The 34th International Conference on Software Engineering, Zurich, Switzerland, pp. 1305\u20131308 (2012)","DOI":"10.1109\/ICSE.2012.6227093"},{"key":"24_CR36","doi-asserted-by":"crossref","unstructured":"Lounis, H., Gayed, T.F., Boukadoum, M.: Machine-learning models for software quality: a compromise between performance and intelligibility. In: The 23rd International Conference on Tools with Artificial Intelligence, Boca Raton, FL, USA, pp. 919\u2013921 (2011)","DOI":"10.1109\/ICTAI.2011.155"},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, P., Su, Y., Wang, C.: Statistical machine learning used in integrated anti-spam system. In: The 6th International Conference on Machine Learning and Cybernetics on Proceedings, Hong Kong, pp. 4055\u20134058 (2007)","DOI":"10.1109\/ICMLC.2007.4370855"},{"key":"24_CR38","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jss.2016.05.002","volume":"118","author":"S Qinbao","year":"2016","unstructured":"Qinbao, S., et al.: A machine learning based software process model recommendation method. J. Syst. Softw. 118, 85\u2013100 (2016)","journal-title":"J. Syst. Softw."},{"key":"24_CR39","doi-asserted-by":"crossref","unstructured":"Mehta, P., Srividya, A., Verma, A.K.: Application of machine learning paradigms for predicting quality in upstream software development life cycle. OPSEARCH 42(4), 332\u2013339 (2005)","DOI":"10.1007\/BF03398746"},{"key":"24_CR40","doi-asserted-by":"crossref","unstructured":"Haran, M., et al.: Applying classification techniques to remotely collected program execution data. In: the 10th European software engineering conference, Lisbon, Portugal, pp. 146\u2013155 (2005)","DOI":"10.1145\/1095430.1081732"},{"key":"24_CR41","unstructured":"Yazhan, M., et al.: Automatic classification of software artifacts in open-source applications. In: The 15th International Conference on Mining Software Repositories on Proceedings, New York, USA, pp. 414\u2013425 (2018)"},{"key":"24_CR42","doi-asserted-by":"crossref","unstructured":"Cunningham, S.J., Summers, B.: Applying machine learning to subject classification and subject description for information retrieval. In: The 2nd New Zealand International Two-Stream Conference on Artificial Neural Networks and Expert Systems on Proceedings, Dunedin, New Zealand, pp. 243\u2013246 (1995)","DOI":"10.1109\/ANNES.1995.499481"},{"key":"24_CR43","doi-asserted-by":"crossref","unstructured":"Bulbul, H.I., Unsal, O.: Comparison of classification techniques used in machine learning as applied on vocational guidance data. In: The 10th International Conference on Machine Learning and Applications and Workshops, Honolulu, HI, USA, pp. 298\u2013301 (2011)","DOI":"10.1109\/ICMLA.2011.49"},{"key":"24_CR44","doi-asserted-by":"crossref","unstructured":"Navarro-Almanza, R., Juarez-Ram\u0131rez, R., Licea, G.: Towards supporting software engineering using deep learning: a case of software requirements classification. In: The 5th International Conference in Software Engineering Research and Innovation, M\u00e9rida, Mexico, pp. 116\u2013120 (2017)","DOI":"10.1109\/CONISOFT.2017.00021"},{"key":"24_CR45","doi-asserted-by":"crossref","unstructured":"Wei-Zhi, W., Xiao-Ping, Y.: Information granules and approximations in incomplete information systems. In: The 6th International Conference on Machine Learning and Cybernetics, Hong Kong, pp. 3740\u20133745 (2007)","DOI":"10.1109\/ICMLC.2007.4370798"},{"key":"24_CR46","doi-asserted-by":"crossref","unstructured":"Zhou, J., Zhang, Q., Tong, S.: Decision rules based on rough set theory in generalized information systems. In: The 5th International Conference on Machine Learning and Cybernetics, Dalian, China, pp. 1477\u20131482 (2009)","DOI":"10.1109\/ICMLC.2006.258762"},{"key":"24_CR47","doi-asserted-by":"crossref","unstructured":"Meinke, K., Bennaceur, A.: Machine learning for software engineering models, methods, and applications. In: The 40th International Conference on Software Engineering, Gothenburg, Sweden, pp. 548\u2013549 (2018)","DOI":"10.1145\/3183440.3183461"},{"key":"24_CR48","unstructured":"Myeongsu, K., Noel, J.J.: Prognostics and Health Management of Electronics: Fundamentals, Machine Learning, and the Internet of Things, 1st edn. John Wiley and Sons Ltd, USA (2018)"},{"key":"24_CR49","doi-asserted-by":"crossref","unstructured":"Louridas, P., Ebert, C.: Machine Learning. IEEE Softw. 33(5), 110\u2013115 (2016)","DOI":"10.1109\/MS.2016.114"},{"key":"24_CR50","doi-asserted-by":"crossref","unstructured":"Meinke, K., Bennaceur, A.: Machine learning for software engineering. In: The 40th International Conference on Software Engineering, Sweden, pp. 548\u2013549 (2018)","DOI":"10.1145\/3183440.3183461"},{"key":"24_CR51","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.procs.2015.10.069","volume":"70","author":"LG Kwang","year":"2015","unstructured":"Kwang, L.G., Ashutosh, K.S.: Comprehensive literature review on machine learning structures for web spam classification. Procedia Comput. Sci. 70, 434\u2013441 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"24_CR52","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1023\/A:1023760326768","volume":"11","author":"D Zhang","year":"2003","unstructured":"Zhang, D., Tsai, J.J.P.: Machine learning and software engineering. Softw. Qual. J. 11, 87\u2013119 (2003)","journal-title":"Softw. Qual. J."},{"issue":"8","key":"24_CR53","first-page":"32","volume":"169","author":"M Praveena","year":"2017","unstructured":"Praveena, M., Jaiganesh, V.: A literature review on supervised machine learning algorithms and boosting process. Int. J. Comp. Appl. 169(8), 32\u201335 (2017)","journal-title":"Int. J. Comp. Appl."},{"key":"24_CR54","doi-asserted-by":"crossref","unstructured":"Dragutin, P., et al.: Work in progress: a machine learning approach for assessment and prediction of teamwork effectiveness in software engineering education. In: The Frontiers in Education Conference, Seattle, WA, USA, pp. 1\u20133 (2012)","DOI":"10.1109\/FIE.2012.6462205"},{"key":"24_CR55","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.jss.2017.11.066","volume":"137","author":"P Pospieszny","year":"2018","unstructured":"Pospieszny, P., Czarnacka-Chrobot, B., Kobylinski, A.: An effective approach for software project effort and duration estimation with machine learning algorithms. J. Syst. Softw. 137, 184\u2013196 (2018)","journal-title":"J. Syst. Softw."},{"key":"24_CR56","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.infsof.2011.09.002","volume":"54","author":"J Wen","year":"2012","unstructured":"Wen, J., Li, S., Lin, Z., Hu, Y., Huang, C.: Systematic literature review of machine learning based software development effort estimation models. Inf. Softw. Technol. 54, 41\u201359 (2012)","journal-title":"Inf. Softw. Technol."},{"issue":"2-3","key":"24_CR57","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11334-017-0288-z","volume":"13","author":"SM Satapathy","year":"2017","unstructured":"Satapathy, S.M., Rath, S.K.: Empirical assessment of machine learning models for agile software development effort estimation using story points. Innov. Syst. Softw. Eng. 13(2\u20133), 191\u2013200 (2017)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"24_CR58","unstructured":"Tao, L., Li, Y.: A synthetic intelligent system for web information mining. In: The International Conference on Machine Learning and Cybernetics, Shanghai, China, pp. 1357\u20131360 (2005)"},{"key":"24_CR59","doi-asserted-by":"crossref","unstructured":"Nawrocka, A., Kot, A., Nawrocki, M.: Application of machine learning in recommendation systems. In: The 19th International Carpathian Control Conference, Szilvasvarad, Hungary, pp. 328\u2013331 (2018)","DOI":"10.1109\/CarpathianCC.2018.8399650"},{"key":"24_CR60","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1016\/j.future.2017.07.003","volume":"86","author":"AB Hernandez","year":"2018","unstructured":"Hernandez, A.B., Perez, M.S., Gupta, S.: Using machine learning to optimize parallelism in big data applications. Futur. Gener. Comput. Syst. 86, 1076\u20131092 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"24_CR61","doi-asserted-by":"crossref","unstructured":"Giger, E., Pinzger, M., Gall, H.C.: Can we predict types of code changes? An empirical analysis. In: The 9th IEEE Working Conference on Mining Software Repositories, Zurich, Switzerland, pp. 217\u2013226 (2012)","DOI":"10.1109\/MSR.2012.6224284"},{"issue":"4","key":"24_CR62","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1007\/s10664-014-9316-x","volume":"20","author":"J Yang","year":"2014","unstructured":"Yang, J., Hotta, K., Higo, Y., Igaki, H., Kusumoto, S.: Classification model for code clones based on machine learning. Empir. Softw. Eng. 20(4), 1095\u20131125 (2014)","journal-title":"Empir. Softw. Eng."},{"key":"24_CR63","doi-asserted-by":"crossref","unstructured":"Tollin, I., Fontana, F.A., Zanoni, M.: Change prediction through coding rules violations. In: The 21st International Conference on Evaluation and Assessment in Software Engineering, New York, USA, pp. 61\u201364 (2017)","DOI":"10.1145\/3084226.3084282"},{"issue":"4","key":"24_CR64","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1007\/s10766-015-0396-z","volume":"44","author":"E Deniz","year":"2016","unstructured":"Deniz, E., Sen, A.: Using machine learning techniques to detect parallel patterns of multi-threaded applications. Int. J. Parallel Program. 44(4), 867\u2013900 (2016)","journal-title":"Int. J. Parallel Program."},{"key":"24_CR65","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jss.2015.01.037","volume":"103","author":"M Zanoni","year":"2015","unstructured":"Zanoni, M., Fontana, F.A., Stella, F.: On applying machine learning techniques for design pattern detection. J. Syst. Softw. 103, 102\u2013117 (2015)","journal-title":"J. Syst. Softw."},{"key":"24_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2018.10.049","volume":"75","author":"S Hussain","year":"2019","unstructured":"Hussain, S., et al.: Automated framework for classification and selection of software design patterns. Appl. Soft Comput. 75, 1\u201320 (2019)","journal-title":"Appl. Soft Comput."},{"key":"24_CR67","doi-asserted-by":"crossref","unstructured":"Chen, N., Hoi, S.C.H., Xiao, X.: Software process evaluation: a machine learning approach. In: The 26th International Conference on Automated Software Engineering, Lawrence, KS, USA, pp. 333\u2013342 (2011)","DOI":"10.1109\/ASE.2011.6100070"},{"issue":"3","key":"24_CR68","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1007\/s10664-012-9230-z","volume":"19","author":"M Linares-V\u00e1squez","year":"2014","unstructured":"Linares-V\u00e1squez, M., McMillan, C., Poshyvanyk, D., Grechanik, M.: On using machine learning to automatically classify software applications into domain categories. Empir. Softw. Eng. 19(3), 582\u2013618 (2014)","journal-title":"Empir. Softw. Eng."},{"key":"24_CR69","doi-asserted-by":"crossref","unstructured":"Chen, N., Hoi, S.C.H., Xiao, X.: Software process evaluation: a machine learning framework with application to defect management process. Emp. Softw. Eng. 19(6), 1531\u20131564 (2014)","DOI":"10.1007\/s10664-013-9254-z"},{"issue":"3","key":"24_CR70","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s13198-012-0123-8","volume":"3","author":"P Kumar","year":"2012","unstructured":"Kumar, P., Singh, Y.: An empirical study of software reliability prediction using machine learning techniques. Int. J. Syst. Assur. Eng. Manage. 3(3), 194\u2013208 (2012)","journal-title":"Int. J. Syst. Assur. Eng. Manage."},{"issue":"1","key":"24_CR71","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/s13198-016-0543-y","volume":"9","author":"A Jaiswal","year":"2016","unstructured":"Jaiswal, A., Malhotra, R.: Software reliability prediction using machine learning techniques. Int. J. Syst. Assur. Eng. Manage. 9(1), 230\u2013244 (2016)","journal-title":"Int. J. Syst. Assur. Eng. Manage."},{"key":"24_CR72","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.ress.2017.10.019","volume":"170","author":"W Jinyong","year":"2018","unstructured":"Jinyong, W., Ce, Z.: Software reliability prediction using a deep learning model based on the RNN encoder decoder. Reliab. Eng. Syst. Saf. 170, 73\u201382 (2018)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"24_CR73","doi-asserted-by":"publisher","first-page":"1631","DOI":"10.1016\/j.engappai.2013.01.008","volume":"26","author":"AR Lenz","year":"2013","unstructured":"Lenz, A.R., Pozo, A., Vergilio, S.R.: Linking software testing results with a machine learning approach. Eng. Appl. Artif. Intell. 26, 1631\u20131640 (2013)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"24_CR74","doi-asserted-by":"crossref","unstructured":"Briand, L.C.: Novel applications of machine learning in software testing. In: The 8th International Conference on Quality Software, Oxford, UK, pp. 3\u201310 (2008)","DOI":"10.1109\/QSIC.2008.29"},{"key":"24_CR75","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/B978-0-12-396535-6.00004-1","volume":"86","author":"R Gove","year":"2012","unstructured":"Gove, R., Faytong, J.: Machine learning and event-based software testing: classifiers for identifying infeasible GUI event sequences. Adv. Comput. 86, 109\u2013135 (2012)","journal-title":"Adv. Comput."},{"key":"24_CR76","doi-asserted-by":"crossref","unstructured":"Czech, M., Hullermeier, E., Jakobs, M., Wehrheim, H.: Predicting rankings of software verification tools. In: The 3rd ACM SIGSOFT International Workshop on Software Analytics, New York, USA, pp. 23\u201326 (2017)","DOI":"10.1145\/3121257.3121262"},{"key":"24_CR77","doi-asserted-by":"crossref","unstructured":"Satoshi, Y.: Deductively verifying embedded software in the era of artificial intelligence = Machine Learning + Software Science. In: The 6th Global Conference on Consumer Electronics, Nagoya, Japan, pp. 1\u20134 (2017)","DOI":"10.1109\/GCCE.2017.8229475"},{"issue":"6","key":"24_CR78","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s00779-003-0247-6","volume":"7","author":"W-P Lee","year":"2003","unstructured":"Lee, W.-P., Cheng-Che, L.: Customising WAP-based information services on mobile networks. Personal Ubiquitous Comput. 7(6), 321\u2013330 (2003)","journal-title":"Personal Ubiquitous Comput."},{"key":"24_CR79","doi-asserted-by":"crossref","unstructured":"Chang, C., Liu, H., Lin, J.: Constructing grading information system for words\u2019 difficulty using a supervised learning method. In: The International Conference on Machine Learning and Cybernetics, Hong Kong, China, pp. 3991\u20133996 (2007)","DOI":"10.1109\/ICMLC.2007.4370844"},{"key":"24_CR80","doi-asserted-by":"crossref","unstructured":"Kong, L., Wu, J.:Dynamic single machine scheduling using Q-learning agent. In: The International Conference on Machine Learning and Cybernetics, Guangzhou, China, pp. 3237\u20133241 (2005)","DOI":"10.1109\/ICMLC.2005.1527501"},{"key":"24_CR81","doi-asserted-by":"crossref","unstructured":"Liu, Q., Li, X., Zhu, H., Fan, H.: Acquisition of open source software project maturity based on time series machine learning. In: The 10th International Symposium on Computational Intelligence and Design, Hangzhou, China, pp. 296\u2013299 (2017)","DOI":"10.1109\/ISCID.2017.20"},{"key":"24_CR82","doi-asserted-by":"crossref","unstructured":"Wang, Y.: Automatic semantic analysis of software requirements through machine learning and ontology approach. J. Shanghai Jiaotong Univ. (Sci.) 21(6), 692\u2013701 (2016)","DOI":"10.1007\/s12204-016-1783-3"},{"key":"24_CR83","doi-asserted-by":"crossref","unstructured":"Harry, R.J.: Poster: software development risk management: using machine learning for generating risk prompts. In: The 37th IEEE International Conference on Software Engineering, Florence, Italy, pp. 833\u2013834 (2015)","DOI":"10.1109\/ICSE.2015.271"},{"key":"24_CR84","doi-asserted-by":"crossref","unstructured":"Chiu, M., Moss, E.: Run-time program-specific phase prediction for python programs. In: The 15th International Conference on Managed Languages & Runtimes, Linz, Austria (2018)","DOI":"10.1145\/3237009.3237011"},{"key":"24_CR85","doi-asserted-by":"publisher","unstructured":"Mezouar, H., El Afia, A.: A 4-level reference for self-adaptive processes based on SCOR and integrating Q-Learning. In: The 4th International Conference on Big Data and Internet of Things (BDIoT 2019), 23 and 24 October 2019, Tangier-Tetuan, Morocco. ACM (2019). https:\/\/doi.org\/10.1145\/3372938.3372953","DOI":"10.1145\/3372938.3372953"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 5th International Conference on Big Data and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07969-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T10:18:40Z","timestamp":1727518720000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07969-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031079689","9783031079696"],"references-count":85,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07969-6_24","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference On Big Data and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mohammed V University in Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bdiot2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.amers.org\/bdiot21\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}