{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:20:21Z","timestamp":1743027621861,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031617522"},{"type":"electronic","value":"9783031617539"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61753-9_7","type":"book-chapter","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T08:02:39Z","timestamp":1716451359000},"page":"124-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Relevance of\u00a0Graph2Vec Source Code Embeddings for\u00a0Software Defect Prediction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3832-7848","authenticated-orcid":false,"given":"Diana-Lucia","family":"Miholca","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9006-0389","authenticated-orcid":false,"given":"Zsuzsanna","family":"One\u0163-Marian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,24]]},"reference":[{"key":"7_CR1","unstructured":"The Seacraft Repository of Empirical Software Engineering Data (2017)"},{"key":"7_CR2","unstructured":"Source-Code Embedding-Based Software Defect Prediction - Data Sets and Detailed Results (2023). https:\/\/figshare.com\/s\/d5a7e8126ccd94181511"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Aladics, T., J\u00e1sz, J., Ferenc, R.: Bug prediction using source code embedding based on Doc2Vec. In: Computational Science and Its Applications, pp. 382\u2013397 (2021)","DOI":"10.1007\/978-3-030-87007-2_27"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Alibrahim, H., Ludwig, S.A.: Hyperparameter optimization: comparing genetic algorithm against grid search and Bayesian optimization. In: 2021 IEEE Congress on Evolutionary Computation (CEC), pp. 1551\u20131559 (2021). https:\/\/doi.org\/10.1109\/CEC45853.2021.9504761","DOI":"10.1109\/CEC45853.2021.9504761"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Begoli, E., Camacho-Rodr\u00edguez, J., Hyde, J., Mior, M.J., Lemire, D.: Apache calcite: a foundational framework for optimized query processing over heterogeneous data sources. In: Proceedings of the International Conference on Management of Data, pp. 221\u2013230 (2018). https:\/\/doi.org\/10.1145\/3183713.3190662","DOI":"10.1145\/3183713.3190662"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"6","key":"7_CR7","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TSE.2009.42","volume":"35","author":"M Cataldo","year":"2009","unstructured":"Cataldo, M., Mockus, A., Roberts, J.A., Herbsleb, J.D.: Software dependencies, work dependencies, and their impact on failures. IEEE Trans. Softw. Eng. 35(6), 864\u2013878 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR8","unstructured":"Dam, H.K., et al.: A deep tree-based model for software defect prediction (2018)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"SC Deerwester","year":"1990","unstructured":"Deerwester, S.C., Dumais, S.T., Landauer, T.K., Furnas, G.W., Harshman, R.A.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41, 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"8","key":"7_CR10","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2006). https:\/\/doi.org\/10.1016\/j.patrec.2005.10.010","journal-title":"Pattern Recogn. Lett."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Fu, W., Menzies, T.: Easy over hard: a case study on deep learning. In: Proceedings of the Joint Meeting on Foundations of Software Engineering, pp. 49\u201360 (2017)","DOI":"10.1145\/3106237.3106256"},{"issue":"6","key":"7_CR12","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2011","unstructured":"Hall, T., Beecham, S., Bowes, D., Gray, D., Counsell, S.: A systematic literature review on fault prediction performance in software engineering. IEEE Trans. Softw. Eng. 38(6), 1276\u20131304 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Herbold, S., Trautsch, A., Trautsch, F., Ledel, B.: Problems with SZZ and features: an empirical study of the state of practice of defect prediction data collection. Empiric. Softw. Eng. 27(2) (Jan 2022). https:\/\/doi.org\/10.1007\/s10664-021-10092-4","DOI":"10.1007\/s10664-021-10092-4"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland, J.H.: Genetic algorithms. Sci. Am. 267(1), 66\u201373 (1992)","journal-title":"Sci. Am."},{"key":"7_CR15","unstructured":"Howard, J., et al.: fastai (2018). https:\/\/github.com\/fastai\/fastai"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Le, Q.V., Mikolov, T.: Distributed representations of sentences and documents. Comput. Res. Reposit. 1\u20139 (2014). https:\/\/doi.org\/10.1145\/2740908.2742760","DOI":"10.1145\/2740908.2742760"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Li, J., He, P., Zhu, J., Lyu, M.R.: Software defect prediction via convolutional neural network. In: IEEE International Conference on Software Quality, Reliability and Security, pp. 318\u2013328 (2017). https:\/\/doi.org\/10.1109\/QRS.2017.42","DOI":"10.1109\/QRS.2017.42"},{"key":"7_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106287","volume":"122","author":"N Li","year":"2020","unstructured":"Li, N., Shepperd, M., Guo, Y.: A systematic review of unsupervised learning techniques for software defect prediction. Inf. Softw. Technol. 122, 106287 (2020)","journal-title":"Inf. Softw. Technol."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Majumder, S., Balaji, N., Brey, K., Fu, W., Menzies, T.: 500+ times faster than deep learning: a case study exploring faster methods for text mining stack overflow. In: Proceedings of the 15th International Conference on Mining Software Repositories (MSR 2018), pp. 554\u2013563. (2018)","DOI":"10.1145\/3196398.3196424"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Malhotra, R.: A systematic review of machine learning techniques for software fault prediction. Appl. Soft Comput. 27, 504\u2013518 (2015). https:\/\/doi.org\/10.1016\/j.asoc.2014.11.023","DOI":"10.1016\/j.asoc.2014.11.023"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Matloob, F., et al.: Software defect prediction using ensemble learning: a systematic literature review. IEEE Access 9, 98754\u201398771 (2021)","DOI":"10.1109\/ACCESS.2021.3095559"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Miholca, D., Onet-Marian, Z.: An analysis of aggregated coupling\u2019s suitability for software defect prediction. In: 2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, pp. 141\u2013148. IEEE Computer Society (2020). https:\/\/doi.org\/10.1109\/SYNASC51798.2020.00032","DOI":"10.1109\/SYNASC51798.2020.00032"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Miholca, D.L., Czibula, G.: Software defect prediction using a hybrid model based on semantic features learned from the source code. In: Knowledge Science, Engineering and Management: 12th International Conference, Part I, pp. 262\u2013274 (2019). https:\/\/doi.org\/10.1007\/978-3-030-29551-6_23","DOI":"10.1007\/978-3-030-29551-6_23"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Miholca, D.L., Czibula, G., Tomescu, V.: Comet: a conceptual coupling based metrics suite for software defect prediction. Procedia Comput. Sci. 176, 31\u201340 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.08.004. Knowledge-Based and Intelligent Information and Engineering Systems: Proceedings of the 24th International Conference KES2020","DOI":"10.1016\/j.procs.2020.08.004"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Miholca., D., One\u0163-Marian., Z.: Source-code embedding-based software defect prediction. In: Proceedings of the 18th International Conference on Software Technologies - ICSOFT, pp. 185\u2013196. INSTICC, SciTePress (2023). https:\/\/doi.org\/10.5220\/0012129600003538","DOI":"10.5220\/0012129600003538"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"64801","DOI":"10.1109\/ACCESS.2022.3181995","volume":"10","author":"DL Miholca","year":"2022","unstructured":"Miholca, D.L., Tomescu, V.I., Czibula, G.: An in-depth analysis of the software features\u2019 impact on the performance of deep learning-based software defect predictors. IEEE Access 10, 64801\u201364818 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3181995","journal-title":"IEEE Access"},{"key":"7_CR27","unstructured":"Narayanan, A., Chandramohan, M., Venkatesan, R., Chen, L., Liu, Y., Jaiswal, S.: Graph2vec: learning distributed representations of graphs (2017)"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Neto, E.C., da Costa, D.A., Kulesza, U.: The impact of refactoring changes on the SZZ algorithm: an empirical study. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 380\u2013390 (2018)","DOI":"10.1109\/SANER.2018.8330225"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Pan, C., Lu, M., Xu, B.: An empirical study on software defect prediction using CodeBERT model. Appl. Sci. 11(11), 4793 (2021). https:\/\/doi.org\/10.3390\/app11114793","DOI":"10.3390\/app11114793"},{"key":"7_CR30","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Radjenovi\u0107, D., Heri\u010dko, M., Torkar, R., \u017divkovi\u010d, A.: Software fault prediction metrics: a systematic literature review. Inf. Softw. Technol. 55(8), 1397\u20131418 (2013). https:\/\/doi.org\/10.1016\/j.infsof.2013.02.009","DOI":"10.1016\/j.infsof.2013.02.009"},{"issue":"2","key":"7_CR32","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10462-017-9563-5","volume":"51","author":"SS Rathore","year":"2019","unstructured":"Rathore, S.S., Kumar, S.: A study on software fault prediction techniques. Artif. Intell. Rev. 51(2), 255\u2013327 (2019)","journal-title":"Artif. Intell. Rev."},{"key":"7_CR33","unstructured":"\u0158eh\u016f\u0159ek, R., Sojka, P.: Software framework for topic modelling with large corpora. In: Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pp. 45\u201350. ELRA (2010)"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Rozemberczki, B., Kiss, O., Sarkar, R.: Karate club: an API oriented open-source python framework for unsupervised learning on graphs. In: Proceedings of the ACM International Conference on Information and Knowledge Management, pp. 3125\u20133132. ACM (2020)","DOI":"10.1145\/3340531.3412757"},{"key":"7_CR35","unstructured":"Sayyad, S., Menzies, T.: The PROMISE repository of software engineering databases. School of Information Technology and Engineering, University of Ottawa (2015). http:\/\/promise.site.uottawa.ca\/SERepository"},{"key":"7_CR36","doi-asserted-by":"publisher","unstructured":"Sikic, L., Kurdija, A.S., Vladimir, K., Silic, M.: Graph neural network for source code defect prediction. IEEE Access 10, 10402\u201310415 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3144598","DOI":"10.1109\/ACCESS.2022.3144598"},{"issue":"7","key":"7_CR37","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TSE.2018.2794977","volume":"45","author":"C Tantithamthavorn","year":"2019","unstructured":"Tantithamthavorn, C., McIntosh, S., Hassan, A.E., Matsumoto, K.: The impact of automated parameter optimization on defect prediction models. IEEE Trans. Softw. Eng. 45(7), 683\u2013711 (2019). https:\/\/doi.org\/10.1109\/TSE.2018.2794977","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR38","doi-asserted-by":"publisher","unstructured":"Uddin, M.N., Li, B., Ali, Z., Kefalas, P., Khan, I., Zada, I.: Software defect prediction employing BiLSTM and BERT-based semantic feature. Soft Comput. 26, 1\u201315 (2022). https:\/\/doi.org\/10.1007\/s00500-022-06830-5","DOI":"10.1007\/s00500-022-06830-5"},{"issue":"12","key":"7_CR39","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TSE.2018.2877612","volume":"46","author":"S Wang","year":"2020","unstructured":"Wang, S., Liu, T., Nam, J., Tan, L.: Deep semantic feature learning for software defect prediction. IEEE Trans. Softw. Eng. 46(12), 1267\u20131293 (2020). https:\/\/doi.org\/10.1109\/TSE.2018.2877612","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, T., Tan, L.: Automatically learning semantic features for defect prediction. In: Proceeding of the International Conference on Software Engineering, pp. 297\u2013308 (2016)","DOI":"10.1145\/2884781.2884804"},{"key":"7_CR41","doi-asserted-by":"publisher","unstructured":"Zhang, D., Tsai, J., Boetticher, G.: Improving credibility of machine learner models in software engineering. In: Advances in Machine Learning Applications in Software Engineering, pp. 52\u201372 (2007). https:\/\/doi.org\/10.4018\/978-1-59140-941-1.ch003","DOI":"10.4018\/978-1-59140-941-1.ch003"}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61753-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T22:03:02Z","timestamp":1735250582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61753-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031617522","9783031617539"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61753-9_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"24 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOFT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoft2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}